期刊文献+

基于逻辑口令锁的整盘加密新方案 被引量:1

New Scheme of Full Disk Encryption Based on Logical Password Lock
下载PDF
导出
摘要 随着可调加密模式的引入,整盘加密相对于文件级加密提供了更优化的抗攻击能力,既能保持加密数据的机密性,还能实现对磁盘结构元数据的隐蔽。然而,现有的磁盘加密方式在拓宽机密数据覆盖的同时也加深了对磁盘主密钥的依赖。被单个密钥所加密的数据量提高后,就引出了密钥管理的难题:怎样使密钥的获取便利与如何减小计算和存储负荷。为解决这类问题,提出一个基于逻辑口令锁的整盘加密方案,并对其进行安全性和性能分析。分析发现,该方案具有比现有磁盘加密方式更高的安全性与效率。 Full disk encryption,which not only holds the secret of encrypted data but also conceals the meta data of disk structure,can give the more optimized defense against attack than file-system-level encryption as the tweakable enciphering mode introduced.However,the current disk encryption will raise dependence on the master key while broadening the coverage of confidential data,because the mount of data encrypted by single key will also be increased,Thus it causes the key distribution problems whether the master key can be derived conveniently and how the workload of computation and storage will be reduced.To solve this,a scheme of full disk encryption based on slide password lock was described and an analysis of environment and efficiency on the scheme was given.
出处 《计算机科学》 CSCD 北大核心 2010年第10期95-97,109,共4页 Computer Science
基金 国家自然科学基金(No.60803151)资助
关键词 计算机安全 磁盘加密 可调分组密码 密钥管理 Computer security Full disk encryption Tweakable block cipher Key management
  • 相关文献

参考文献12

  • 1Gjosteen K, et al. Security Notions for Disk Encryption[C]//Computer Security -Proc of the 10th European Symposium on Research in Computer Security ( ESORICS' 05 ). LNCS 3679. Springer, 2005: 455-474. 被引量:1
  • 2Dowdeswell R C, et al. The Cryptographic Disk Driver[C]//Proceedings of the Annual USENIX Technical Conference. FREENIX Track,June 2003:179-186. 被引量:1
  • 3Rogaway Halevi S. A Parallelizable Enciphering Mode [C]// Oksmoto Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems(CT-RSA 2004). LNCS 2964. Berlin: Springer- Verlag, 2004 : 292-304. 被引量:1
  • 4EME Halevi S. Extending EME to Handle Arbitrary-Length Messages With Associated Data[C]//Canteaut A, Viswanathan K,eds. Proc of the 5th International Conference on Cryptology in India(INDOCRYPT 2004). LNCS 3348. Berlin: Springer-Vetlag, 2004.. 315-327. 被引量:1
  • 5McGrew D A, Fluhrer S R. The Extended Codebook (XCB) Mode of Operation [EB/OL]. http://eprint. iacr. org/, 2004/ 278. 被引量:1
  • 6Wang P, Feng D, Wu W. HCTR:A Viriable-Input-Length Enciphering Mode[C]///SKLOIS Conference on Information Securi ty and Cryptology (CISC 2005). LNCS 3822. Berlin: Springer- Verlag, 2005 : 175-188. 被引量:1
  • 7Chakraborty D, Sarkar P. HCH:A New Tweakable Enciphering Scheme Using the Hash- Encrypt-Hash Approach[-C]//Barua R, Lange T, eds. Progress in Cryptology (INDOCRYPT). LNCS 4329. Berlin: Springer-Verlag, 2006 : 287-302. 被引量:1
  • 8Chakraborty D, Sarkar P. A New Mode of Encryption Providing a Tweakable Strong Pseudo- Random Permutation[C]//Robshaw B J M, eds. Fast Software Encryption(FSE' 2006). LNCS 4047. Berlin: Springer-Verlag, 2006 : 293-309. 被引量:1
  • 9Halevi S. Invertible Universal Hashing and the TET Encryption Mode[C]//Menezes A, eds. Advanees in Cryptology(CRYPTO 2007). LNCS 4622. Berlin: Springer-Verlag, 2007 : 412-429. 被引量:1
  • 10Sarkar P. Improving upon the TET Mode of Operation[C] // Nam K H, Rhee G, eds. Information Security and Cryptology (ICISC 2007). LNCS 4817. Berlin: Springer-Verlag, 2007: 180- 192. 被引量:1

二级参考文献25

  • 1黄承夏,杨林,马琳茹,李京鹏.基于组件技术的网络安全管理架构研究[J].信息安全与通信保密,2006,28(6):61-63. 被引量:9
  • 2陈汉章,张玉清.一种基于插件与联动技术的复合安全网关[J].计算机工程,2006,32(15):143-145. 被引量:4
  • 3Corradi A,Montanari R, Lupu E, et al. A Flexible Access Control Service for Java Mobile Code//IEEE Annual Computer Security Applications Conference. New Orleans, USA, 2000 被引量:1
  • 4Jarnhour E. Distributed Security Management Using LDA PDirectories//The 21st International Conference of the Chilean Computer Science Society. Punta Arenas, Chile, 2001 被引量:1
  • 5Tsoumas B, Gritzalis D. Towards an Ontology - based Security Management//The 20th IEEE International Conference on Advanced Information Networking and Applications. Vienna, Austria, 2006 被引量:1
  • 6Tsoumas B,Dritsas S,Gritzalis D. An Ontology-Based Approach to Information Systems Security Management//Computer Network Security. Heidelberg: Springer Berlin, 2005 : 151-164 被引量:1
  • 7Shin M,Moon H,Ryu K H, et al. Applying Data Mining Techniques to Analyze Alert Data//The 5th Asia-Pacific Web Conference. Xian, China, 2003 被引量:1
  • 8Bidou R. Security Operation Center Concept & Implementation. http://www. ossim, net/docs, php 被引量:1
  • 9Hyland P C, Sandhu R. Concentric Supervision of Security Applications: A New Security Management Paradigm// Annual Computer Security Application Conference. Phoenix, USA, 1998 被引量:1
  • 10Boudaoud K , McCatieNevile C. An Intelligent Agent - based Model for Security Management//The 7th IEEE International Symposium on Computers and Communications. Taormina, Italy, 2002 被引量:1

共引文献43

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部