Encrypted watermarks and Linux laptop security

被引:0
|
作者
Saarinen, MJO [1 ]
机构
[1] Helsinki Univ Technol, Lab Theoret Comp Sci, FIN-02015 Helsinki, Finland
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encryption key. We take a look into the practical problems of securely booting, authenticating, and keying full-disk encryption. We propose simple improvements to the current CryptoLoop implementation based on the notions of tweakable encryption algorithms and enciphering modes. We also discuss sector-level authentication codes. The new methods have been implemented as a set of patches to the Linux Kernel series 2.6 and the relevant system tools.
引用
收藏
页码:27 / 38
页数:12
相关论文
共 50 条
  • [1] Watermarks encrypted in the cascaded Fresnel digital hologram
    Deng, Shaogeng
    Liu, Liren
    Lang, Haitao
    Zhao, Dong
    Liu, Ximin
    OPTIK, 2007, 118 (06): : 302 - 305
  • [2] Managing Laptop Security
    Burnett, Royce D.
    Friedman, Mark
    Rodriguez, Ramon P., Jr.
    JOURNAL OF CORPORATE ACCOUNTING AND FINANCE, 2011, 22 (05): : 53 - 61
  • [3] Security of copy-control watermarks
    Petrovic, Rade
    Tebranchi, Babak
    Winograd, Joseph M.
    TELSIKS 2007: 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES, VOLS 1 AND 2, 2007, : 117 - +
  • [4] Security of fragile authentication watermarks with localization
    Fridrich, J
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 691 - 700
  • [5] Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator
    Abookasis, D
    Montal, O
    Abramson, O
    Rosen, J
    APPLIED OPTICS, 2005, 44 (15) : 3019 - 3023
  • [6] Tampering Detection of Audio-Visual Content using Encrypted Watermarks
    Rigoni, Ronaldo
    Freitas, Pedro Garcia
    Farias, Mylene C. Q.
    2014 27TH SIBGRAPI CONFERENCE ON GRAPHICS, PATTERNS AND IMAGES (SIBGRAPI), 2014, : 196 - 203
  • [7] Block based embedding of encrypted watermarks using singular value decomposition
    Ghazy, Rania A.
    Amoon, Mohammed
    Abdallah, Hanaa A.
    El-Fishawy, Nawal A.
    Hadhoud, Mohiy M.
    Dessouky, Moawad I.
    Alshebeili, Saleh A.
    Abd El-Samie, Fathi E.
    OPTIK, 2014, 125 (20): : 6299 - 6304
  • [8] Linux Security Modules: General security support for the Linux kernel
    Wright, C
    Cowan, C
    Smalley, S
    Morris, J
    Kroah-Hartman, G
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 17 - 31
  • [9] Digital watermarks as a security feature for identity documents
    Perry, B
    Carr, S
    Patterson, P
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES III, 2000, 3973 : 80 - 87
  • [10] On the Design of Security-Guaranteeing Dynamic Watermarks
    Satchidanandan, Bharadwaj
    Kumar, P. R.
    IEEE CONTROL SYSTEMS LETTERS, 2020, 4 (02): : 307 - 312