Encrypted watermarks and Linux laptop security

被引:0
|
作者
Saarinen, MJO [1 ]
机构
[1] Helsinki Univ Technol, Lab Theoret Comp Sci, FIN-02015 Helsinki, Finland
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encryption key. We take a look into the practical problems of securely booting, authenticating, and keying full-disk encryption. We propose simple improvements to the current CryptoLoop implementation based on the notions of tweakable encryption algorithms and enciphering modes. We also discuss sector-level authentication codes. The new methods have been implemented as a set of patches to the Linux Kernel series 2.6 and the relevant system tools.
引用
收藏
页码:27 / 38
页数:12
相关论文
共 50 条
  • [41] Security Namespace : Making Linux Security Frameworks Available to Containers
    Sun, Yuqiong
    Safford, David
    Zohar, Mimi
    Pendarakis, Dimitrios
    Gu, Zhongshu
    Jaeger, Trent
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1423 - 1439
  • [42] Joins over Encrypted Data with Fine Granular Security
    Hahn, Florian
    Loza, Nicolas
    Kerschbaum, Florian
    2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 674 - 685
  • [43] The Illusion of Visual Security: Reconstructing Perceptually Encrypted Images
    Yang, Ying
    Xiang, Tao
    Lv, Xiao
    Guo, Shangwei
    Zeng, Tieyong
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (05) : 3998 - 4010
  • [44] Verifiably Encrypted Signatures: Security Revisited and a New Construction
    Hanser, Christian
    Rabkin, Max
    Schroeder, Dominique
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 146 - 164
  • [45] Security sensor providing analysis of encrypted network data
    Hamburg, Daniel
    Tuechelmann, York
    WEBIST 2006: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 172 - +
  • [46] Nothing is for Free: Security in Searching Shared and Encrypted Data
    Tang, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1943 - 1952
  • [47] Enhancing Security of Encrypted Data Sharing on Social Networks
    Chutke, Prajakta D.
    Hadap, M. K.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [48] Encrypted model predictive control design for security to cyberattacks
    Suryavanshi, Atharva
    Alnajdi, Aisha
    Alhajeri, Mohammed
    Abdullah, Fahim
    Christofides, Panagiotis D.
    AICHE JOURNAL, 2023, 69 (08)
  • [49] Information Security Through Encrypted Domain Data Hiding
    Kumar, Vikas
    Muchhal, Prateek
    Thanikasiselvan, V
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 370 - 379
  • [50] Anti-theft security system for Plan Ceibal XO laptop
    Pastorino, Emiliano
    Haim, Fiorella
    2009 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2009, : 108 - 111