Encrypted watermarks and Linux laptop security

被引:0
|
作者
Saarinen, MJO [1 ]
机构
[1] Helsinki Univ Technol, Lab Theoret Comp Sci, FIN-02015 Helsinki, Finland
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encryption key. We take a look into the practical problems of securely booting, authenticating, and keying full-disk encryption. We propose simple improvements to the current CryptoLoop implementation based on the notions of tweakable encryption algorithms and enciphering modes. We also discuss sector-level authentication codes. The new methods have been implemented as a set of patches to the Linux Kernel series 2.6 and the relevant system tools.
引用
收藏
页码:27 / 38
页数:12
相关论文
共 50 条
  • [31] Security enhancement for AES encrypted speech in communications
    Mossa E.
    International Journal of Speech Technology, 2017, 20 (01) : 163 - 169
  • [32] Trusted path execution for the Linux 2.6 kernel as a Linux Security Module
    Rahimi, NA
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 73 - 80
  • [33] USB Security Camera Software for Linux
    Weerachai, J.
    Siam, P.
    Narawith, K.
    2ND INTERNATIONAL SCIENCE, SOCIAL SCIENCE, ENGINEERING AND ENERGY CONFERENCE 2010 (I-SEEC 2010), 2011, 8 : 171 - 176
  • [34] Quantifying the Security Profile of Linux Applications
    Androutsopoulos, G. C.
    Kappes, Giorgos
    Anastasiadis, Stergios, V
    PROCEEDINGS OF THE 14TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2023, 2023, : 80 - 86
  • [35] Security Analysis of Access Linux Platform
    Sjoestroem, Andreas
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Shin, Wook
    Tanaka, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (05): : 12 - 18
  • [36] Accelerating Linux Security with eBPF iptables
    Bertrone, Matteo
    Miano, Sebastiano
    Risso, Fulvio
    Tumolo, Massimo
    SIGCOMM'18: PROCEEDINGS OF THE ACM SIGCOMM 2018 CONFERENCE: POSTERS AND DEMOS, 2018, : 108 - 110
  • [37] The Study of Access Mechanism for the Security of Linux
    Wang ChengJiong
    INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS RESEARCH, 2013, 422 : 176 - 180
  • [38] The seven deadly sins of Linux security
    Horizon Network Security
    Queue, 2007, 4 (38-47): : 38 - 47
  • [39] Understanding the Security of Linux eBPF Subsystem
    Mohamed, Mohamed Husain Noor
    Wang, Xiaoguang
    Ravindran, Binoy
    PROCEEDINGS OF THE 14TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2023, 2023, : 87 - 92
  • [40] Security Model to Ensure Copyright of Medical Information Using Digital Watermarks
    Okawa, Akiko
    Umeda, Tokuo
    Gomi, Tsutomu
    Asaba, Kaori
    Takahata, Masako
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 312 - 312