When cryptography meets storage

@inproceedings{Diesburg2008WhenCM,
  title={When cryptography meets storage},
  author={Sarah M. Diesburg and Christopher R. Meyers and David M. Lary and An-I Wang},
  booktitle={StorageSS '08},
  year={2008}
}
Confidential data storage through encryption is becoming increasingly important. Designers and implementers of encryption methods of storage media must be aware that storage has different usage patterns and properties compared to securing other information media such as networks. In this paper, we empirically demonstrate two-time pad vulnerabilities in storage that are exposed via shifting file contents, in-place file updates, storage mechanisms hidden by layers of abstractions, inconsistencies… CONTINUE READING

Figures, Tables, and Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-3 OF 3 REFERENCES

AES-CBC + Elephant diffuser: A Disk Encryption Algorithm for Windows Vista

N. Ferguson
  • Technical Report,
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL