FAST: DISK ENCRYPTION AND BEYOND

被引:1
|
作者
Chakraborty, Debrup [1 ]
Ghosh, Sebati [1 ]
Lopez, Cuauhtemoc Mancillas [2 ]
Sarkar, Palash [1 ]
机构
[1] Indian Stat Inst, 203,BT Rd, Kolkata 700108, India
[2] CINVESTAV IPN, Dept Comp Sci, Mexico City 07360, DF, Mexico
关键词
Disk encryption; tweakable enciphering schemes; pseudo-random func-tion; Horner; BRW; TWEAKABLE ENCIPHERING SCHEMES; SECURITY TREATMENT; MODE; CIPHER;
D O I
10.3934/amc.2020108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work introduces FAST which is a new family of tweakable enciphering schemes. Several instantiations of FAST are described. These are targeted towards two goals, the specific task of disk encryption and a more general scheme suitable for a wide variety of practical applications. A major contribution of this work is to present detailed and careful software implementations of all of these instantiations. For disk encryption, the results from the implementations show that FAST compares very favourably to the IEEE disk encryption standards XCB and EME2 as well as the more recent proposal AEZ. FAST is built using a fixed input length pseudo-random function and an appropriate hash function. It uses a single-block key, is parallelisable and can be instantiated using only the encryption function of a block cipher. The hash function can be instantiated using either the Horner's rule based usual polynomial hashing or hashing based on the more efficient Bernstein Rabin-Winograd polynomials. Security of FAST has been rigorously analysed using the standard provable security approach and concrete security bounds have been derived. Based on our implementation results, we put forward FAST as a serious candidate for standardisation and deployment.
引用
收藏
页码:185 / 230
页数:46
相关论文
共 50 条
  • [1] Fast Disk Encryption Through GPGPU Acceleration
    Agosta, Giovanni
    Barenghi, Alessandro
    De Santis, Fabrizio
    Di Biagio, Andrea
    Pelosi, Gerardo
    [J]. 2009 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT 2009), 2009, : 102 - +
  • [2] A STUDY ON ENCRYPTION ALGORITHMS AND MODES FOR DISK ENCRYPTION
    Alomari, Mohammad Ahmed
    Samsudin, Khairulmizam
    Ramli, Abdul Rahman
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 793 - +
  • [3] Security notions for disk encryption
    Gjosteen, K
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 455 - 474
  • [4] Fast encryption for multimedia
    Yi, X
    Tan, CH
    Siew, CK
    Syed, MR
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2001, 47 (01) : 101 - 107
  • [5] A Disk Encryption Method Based on SDMS
    Ri, Myongchol
    An, Dokjun
    Choe, Changil
    Han, Sunam
    Kim, Yongmin
    [J]. 2012 INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATION (ICAIC 2012), 2013, : 10 - 15
  • [6] Extending Full Disk Encryption for the Future
    Broz, Milan
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 109 - 115
  • [7] GBDE - GEOM based disk encryption
    Kamp, PH
    [J]. USENIX ASSOCIATION PROCEEDINGS OF BSDCON '03, 2003, : 57 - 68
  • [8] Disk-Enabled Authenticated Encryption
    Butler, Kevin
    McLaughlin, Stephen
    McDaniel, Patrick
    [J]. 2010 IEEE 26TH SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST), 2010,
  • [9] DISK ARRAYS AND BEYOND
    NASS, R
    [J]. ELECTRONIC DESIGN, 1992, 40 (04) : 18 - 18
  • [10] Beyond the Black Disk
    不详
    [J]. NEW SCIENTIST, 2017, 235 (3136) : 13 - 13