Encrypted watermarks and Linux laptop security

被引:0
|
作者
Saarinen, MJO [1 ]
机构
[1] Helsinki Univ Technol, Lab Theoret Comp Sci, FIN-02015 Helsinki, Finland
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encryption key. We take a look into the practical problems of securely booting, authenticating, and keying full-disk encryption. We propose simple improvements to the current CryptoLoop implementation based on the notions of tweakable encryption algorithms and enciphering modes. We also discuss sector-level authentication codes. The new methods have been implemented as a set of patches to the Linux Kernel series 2.6 and the relevant system tools.
引用
收藏
页码:27 / 38
页数:12
相关论文
共 50 条
  • [21] Linux server security.
    Gordon, RS
    LIBRARY JOURNAL, 2005, 130 (10) : 166 - 166
  • [22] Enhancing ReiserFS security in Linux
    Reiser, HT
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 188 - 188
  • [23] Blind extraction and security analysis of spread spectrum hidden watermarks
    Marsh, John A.
    Wohlrab, Gerard F.
    CYBER SENSING 2012, 2012, 8408
  • [24] Encrypted Image Search Scheme with Forward Security
    Ge, Yue
    Li, Yu-Xi
    Zhou, Fu-Cai
    Zhang, Xin-Yue
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2021, 42 (08): : 1079 - 1085
  • [25] Optimization of encrypted hologram in optical security systems
    Ohtsubo, J
    Nakayama, K
    2004 IEEE LEOS ANNUAL MEETING CONFERENCE PROCEEDINGS, VOLS 1 AND 2, 2004, : 342 - 343
  • [26] New security results on encrypted key exchange
    Bresson, E
    Chevassut, O
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 145 - 158
  • [27] Measurement for encrypted open resolvers: Applications and security
    Wang, Qiuyun
    Luo, Meng
    Yao, Yepeng
    Xin, Liling
    Jiang, Zhengwei
    Shi, Wenchang
    COMPUTER NETWORKS, 2022, 213
  • [28] Encrypted sensing for enhancing security of biometric authentication
    Suzuki, Hiroyuki
    Takeda, Masafumi
    Obi, Takashi
    Yamaguchi, Masahiro
    Ohyama, Nagaaki
    Nakano, Kazuya
    2014 13TH WORKSHOP ON INFORMATION OPTICS (WIO), 2014,
  • [29] On the Security of Selectively Encrypted HEVC Video Bitstreams
    Chen, Chen
    Qu, Lingfeng
    Amirpour, Hadi
    Wang, Xingjun
    Timmerer, Christian
    Tian, Zhihong
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (09)
  • [30] Optimization of encrypted holograms in optical security systems
    Yamazaki, M
    Ohtsubo, J
    OPTICAL ENGINEERING, 2001, 40 (01) : 132 - 137