欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ANSI IEEE 1619 2-2010 Wide-Block Encryption for Shared Storage Media (IEEE Computer Society)《共享存储媒体分块加密标准》.pdf

    • 资源ID:1242389       资源大小:670.05KB        全文页数:91页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ANSI IEEE 1619 2-2010 Wide-Block Encryption for Shared Storage Media (IEEE Computer Society)《共享存储媒体分块加密标准》.pdf

    1、 IEEE Standard for Wide-Block Encryption for Shared Storage Media IEEE Computer Society Sponsored by the Information Assurance Standards Committee and Storage Systems Standards Committee IEEE 3 Park Avenue New York, NY 10016-5997 USA 8 March 2011 IEEE Std 1619.22010 IEEE Std 1619.2-2010 IEEE Standar

    2、d for Wide-Block Encryption for Shared Storage Media Sponsor Information Assurance Standards Committee and Storage Systems Standards Committee of the IEEE Computer Society Approved 30 September 2010 IEEE-SA Standards Board Approved 5 May 2011 American National Standards Institute Abstract: EME2-AES

    3、and XCB-AES wide-block encryption with associated data (EAD) modes of the NIST AES block cipher, providing usage guidelines and test vectors, are described. A wide-block encryption algorithm behaves as a single block cipher with a large plaintext input and ciphertext output, but uses a narrow block

    4、cipher in this case Advanced Encryption Standard (AES) internally. These encryption modes are oriented toward random access storage devices that do not provide authentication, but need to reduce the granularity of a potential attack. Keywords: data-at-rest security, encryption, encryption with assoc

    5、iated data (EAD), encrypt-mix-encrypt-v2 mode of operation (EME2), extended codebook mode of operation (XCB), IEEE 1619.2, security, storage The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA Copyright 2011 by the Institute of Electrical and Elect

    6、ronics Engineers, Inc. All rights reserved. Published 8 March 2011. Printed in the United States of America. IEEE is a registered trademark in the U.S. Patent +1 978 750 8400. Permission to photocopy portions of any individual standard for educational classroom use can also be obtained through the C

    7、opyright Clearance Center. iv Copyright 2011 IEEE. All rights reserved. Introduction This introduction is not part of IEEE Std 1619.2-2010, IEEE Standard for Wide-Block Encryption for Shared Storage Media. The purpose of this standard, similar to IEEE Std 1619-2007 B2, is to describe a method of enc

    8、ryption for data stored in logical block-based devices, where the threat model includes possible access to stored data by the adversary.aAs in IEEE Std 1619-2007, this standard specifies length-preserving encryption algorithms to be applied to the plaintext logical block before storing it on the sto

    9、rage media. This standard improves on IEEE Std 1619-2007 by defining wide-block encryption algorithms. This means that they act on the whole logical block at once, and each bit on the input plaintext influences every bit of the output ciphertext (and vice versa for decryption). In particular, this s

    10、tandard specifies the EME2-AES and the XCB-AES wide-block encryption algorithms. Wide-block encryption better hides plaintext statistics and provides better protection than the narrow-block encryption, defined in IEEE Std 1619-2007, against attacks that involve traffic analysis and/or manipulations

    11、of ciphertext on the raw storage media. Notice to users Laws and regulations Users of these documents should consult all applicable laws and regulations. Compliance with the provisions of this standard does not imply compliance to any applicable regulatory requirements. Implementers of the standard

    12、are responsible for observing or referring to the applicable regulatory requirements. IEEE does not, by the publication of its standards, intend to urge action that is not in compliance with applicable laws, and these documents may not be construed as doing so. Copyrights This document is copyrighte

    13、d by the IEEE. It is made available for a wide variety of both public and private uses. These include both use, by reference, in laws and regulations, and use in private self-regulation, standardization, and the promotion of engineering practices and methods. By making this document available for us

    14、e and adoption by public authorities and private users, the IEEE does not waive any rights in copyright to this document. aThe numbers in brackets correspond to those of the bibliography in Annex A. v Copyright 2011 IEEE. All rights reserved. Updating of IEEE documents Users of IEEE standards should

    15、 be aware that these documents may be superseded at any time by the issuance of new editions or may be amended from time to time through the issuance of amendments, corrigenda, or errata. An official IEEE document at any point in time consists of the current edition of the document together with any

    16、 amendments, corrigenda, or errata then in effect. In order to determine whether a given document is the current edition and whether it has been amended through the issuance of amendments, corrigenda, or errata, visit the IEEE Standards Association web site at http:/ieeexplore.ieee.org/xpl/standards

    17、.jsp, or contact the IEEE at the address listed previously. For more information about the IEEE Standards Association or the IEEE standards development process, visit the IEEE-SA web site at http:/standards.ieee.org. Errata Errata, if any, for this and all other standards can be accessed at the foll

    18、owing URL: http:/standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for errata periodically. Interpretations Current interpretations can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/interp/ index.html. Patents Attention is cal

    19、led to the possibility that implementation of this standard may require use of subject matter covered by patent rights. By publication of this standard, no position is taken with respect to the existence or validity of any patent rights in connection therewith. A patent holder or patent applicant ha

    20、s filed a statement of assurance that it will grant licenses under these rights without compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of any unfair discrimination to applicants desiring to obtain such licenses. Other Essential Patent Claims m

    21、ay exist for which a statement of assurance has not been received. The IEEE is not responsible for identifying Essential Patent Claims for which a license may be required, for conducting inquiries into the legal validity or scope of Patents Claims, or determining whether any licensing terms or condi

    22、tions provided in connection with submission of a Letter of Assurance, if any, or in any licensing agreements are reasonable or non-discriminatory. Users of this standard are expressly advised that determination of the validity of any patent rights, and the risk of infringement of such rights, is en

    23、tirely their own responsibility. Further information may be obtained from the IEEE Standards Association. vi Copyright 2011 IEEE. All rights reserved. Participants At the time this standard was submitted to the IEEE-SA Standards Board for approval, the Security in Storage Working Group had the follo

    24、wing sponsorship: James P. Hughes, Sponsor Chair (IASC) Eric A. Hibbard, Sponsor Vice Chair (IASC) John L. Cole, Past Sponsor Chair (IASC) Curtis Anderson, Co-Sponsor Chair (SSSC) At the time this standard was submitted to the IEEE-SA Standards Board for approval, the Security in Storage Working Gro

    25、up had the following membership: Matthew V. Ball, Chair Eric A. Hibbard, Vice Chair Walter Hubis, Secretary Fabio Maino, Technical Editor and Past Secretary James P. Hughes, Past Chair Gideon Avida Jim Coomes Robert Elliott Hal Finney John Geldman Bob Griffin Cyril Guyot Shai Halevi Laszlo Hars Larr

    26、y Hofer Glen Jaquette Scott Kipp Curt Kolovson Robert Lockhart Charlie Martin David McGrew Gary Moorhead Bob Nixon Landon Curt Noll Jim Norton Scott Painter Dave Peterson Serge Plotkin Niels Reimers Subhash Sankuratripati David Sheehy Bob Snively Joel Spencer Doug Whiting Mike Witkowski Special than

    27、ks for their important technical contribution to this standard to the following individuals: Hal Finney Brian Gladman Shai Halevi David McGrew vii Copyright 2011 IEEE. All rights reserved. The following members of the individual balloting committee voted on this standard. Balloters may have voted fo

    28、r approval, disapproval, or abstention. Johann Amsenga Khin Mi Mi Aung Matthew V. Ball Rahul Bhushan Juan Carreon Keith Chow John Cole Geoffrey Darnton Russell Dietz Thomas Dineen Robert Elliott Andrew Fieldsend C. Fitzgerald John Geldman Ron Greenthaler Randall Groves Laszlo Hars Eric A. Hibbard We

    29、rner Hoelzl Larry Hofer Walter Hubis Raj Jain Scott Kipp Susan Land Kenneth Lang Daniel Levesque Robert Lockhart William Lumpkins G. Luri Fabio Maino Edward McCall Jeffrey Moore Finnbarr Murphy Michael S. Newman Landon Curt Noll Ulrich Pohl Randall Safier Bartien Sayogo Stephen Schwarm Akihiro Shimu

    30、ra Gil Shultz Steven Smith Kapil Sood Thomas Starai Rene Struik Walter Struppler Joseph Tardo Brian Weis Oren Yuen When the IEEE-SA Standards Board approved this standard on 30 September 2010, it had the following membership: Robert M. Grow, Chair Richard H. Hulett, Vice Chair Steve M. Mills, Past C

    31、hair Judith Gorman, Secretary Karen Bartleson Victor Berman Ted Burse Clint Chaplin Andy Drozd Alexander Gelman Jim Hughes Young Kyun Kim Joseph L. Koepfinger* John Kulick David J. Law Hung Ling Oleg Logvinov Ted Olsen Ronald C. Petersen Thomas Prevost Jon Walter Rosdahl Sam Sciacca Mike Seavey Curt

    32、is Siller Don Wright *Member Emeritus Also included are the following nonvoting IEEE-SA Standards Board liaisons: Satish K. Aggarwal, NRC Representative Richard DeBlasio, DOE Representative Michael Janezic, NIST Representative Michelle Turner IEEE Standards Program Manager, Document Development Mich

    33、ael D. Kipness IEEE Standards Program Manager, Technical Program Development viii Copyright 2011 IEEE. All rights reserved. Contents 1. Overview 1 1.1 Scope . 1 1.2 Purpose 1 2. Normative references 1 3. Definitions, acronyms, and abbreviations 2 3.1 Definitions . 2 3.2 Keywords. 2 3.3 Acronyms and

    34、abbreviations . 3 4. Mathematical conventions 3 5. Wide-block encryption algorithms . 4 5.1 Encryption with associated data 4 5.2 EME2-AES algorithm . 6 5.3 XCB-AES algorithm 12 6. Compliance. 18 Annex A (informative) Bibliography . 19 Annex B (informative) Implementation guidance 20 Annex C (inform

    35、ative) Test vectors . 22 1 Copyright 2011 IEEE. All rights reserved. IEEE Standard for Wide-Block Encryption for Shared Storage Media IMPORTANT NOTICE: This standard is not intended to ensure safety, security, health, or environmental protection. Implementers of the standard are responsible for dete

    36、rmining appropriate safety, security, environmental, and health practices or regulatory requirements. This IEEE document is made available for use subject to important notices and legal disclaimers. These notices and disclaimers appear in all publications containing this document and may be found un

    37、der the heading “Important Notice” or “Important Notices and Disclaimers Concerning IEEE Documents.” They can also be obtained on request from IEEE or viewed at http:/standards.ieee.org/IPR/disclaimers.html. 1. Overview 1.1 Scope This standard specifies an architecture for encryption of data in rand

    38、om access storage devices, oriented toward applications that benefit from wide encryption-block sizes of 512 bytes and above. 1.2 Purpose This standard specifies an architecture for media security and enabling components. Wide encryption blocks are well suited to environments where the attacker has

    39、repeated access to cryptographic communication or ciphertext, or is able to perform traffic analysis of data access patterns. The standard is oriented toward fixed-size encryption blocks without data expansion, but anticipates an optional data expansion mode to resist attacks involving data tamperin

    40、g. 2. Normative references The following referenced documents are indispensable for the application of this document (i.e., they must be understood and used, so each referenced document is cited in text and its relationship to this document is explained). For dated references, only the edition cited

    41、 applies. For undated references, the latest edition of the referenced document (including any amendments or corrigenda) applies. IEEE Std 1619.2-2010 IEEE Standard for Wide-Block Encryption for Shared Storage Media 2 Copyright 2011 IEEE. All rights reserved. NIST Federal Information Processing Stan

    42、dard 197 (FIPS 197), Advanced Encryption Standard (AES). November 2001.1NIST Special Publication 800-38A (NIST SP 800-38A), Recommendation for Block Cipher Modes of OperationMethods and Techniques. 3. Definitions, acronyms, and abbreviations 3.1 Definitions For the purposes of this document, the fol

    43、lowing terms and definitions apply. The IEEE Standards Dictionary: Glossary of Terms or that a certain course of action is preferred but not necessarily required; or that (in the negative form) a certain course of action is deprecated but not prohibited (should equals is recommended to). 1NIST publi

    44、cations are available from the National Institute of Standards and Technology, NIST Public Inquiries, NIST, 100 Bureau Drive, Stop 3460, Gaithersburg, MD, 20899-3460, USA (www.nist.gov). 2The IEEE Standards Dictionary: Glossary of Terms more specifically, if the encryption of the plaintext P with th

    45、e key K and the associated data A results in the ciphertext C, then the decryption of C with the key K and the associated data A results in the plaintext P. A conforming implementation shall include in the associated data only information that is available, in plaintext form, at the time of encrypti

    46、on and the time of decryption. The associated data input shall uniquely identify the plaintext. This is because whenever the same plaintext is encrypted two different times using the same key but with distinct associated data values, the result is IEEE Std 1619.2-2010 IEEE Standard for Wide-Block En

    47、cryption for Shared Storage Media 5 Copyright 2011 IEEE. All rights reserved. two distinct ciphertext values. Thus the use of distinct associated data values hides the equality of the plaintexts from an attacker. 5.1.2 Using EAD to protect a string of data blocks An EAD may be used to protect a stri

    48、ng of data blocks, such as those in a data-storage disk. In this application, the associated data input to the encryption and decryption procedure should contain the logical index of the block on which the procedure is acting. When this information is included in the associated data, cases in which

    49、two distinct data blocks contain identical plaintext values are hidden from an adversary. Figure 1 shows an example of how an EAD performs encryption and decryption. EADEncryptionProcedurePlaintext Block 00Plaintext Block 01Plaintext Block 02Plaintext Block 03Ciphertext Block 00Ciphertext Block 01Ciphertext Block 02Ciphertext Block 03Secret KeyPlaintextAssociated DataCiphertextEADDecryptionProcedurePlaintext Block 00Plaintext Block 01Plaintext Block 02Plaintext Block 03Ciphertext Block 00Ciphertext Block 01Ciphertext Block 02Ciphertext Block 03Secret Key


    注意事项

    本文(ANSI IEEE 1619 2-2010 Wide-Block Encryption for Shared Storage Media (IEEE Computer Society)《共享存储媒体分块加密标准》.pdf)为本站会员(bonesoil321)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开