Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Androidâ„¢ device!
Download
Faster access than browser!
 

Disk encryption theory

Index Disk encryption theory

Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). [1]

53 relations: Advanced Encryption Standard, Adversary (cryptography), Alex Halderman, BestCrypt, BitLocker, Block (data storage), Block cipher, Block cipher mode of operation, Botan (programming library), Btrfs, Ciphertext stealing, Cold boot attack, Confidentiality, Cryptographic hash function, Data at rest, Data remanence, Data retrieval, Disk encryption hardware, Disk encryption software, Disk sector, DiskCryptor, Dm-crypt, Edward Felten, Exclusive or, Ext4, FileVault, Finite field, Finite field arithmetic, FreeBSD, FreeOTFE, Galois/Counter Mode, Geli (software), IEEE P1619, Initialization vector, Linux kernel, Mac OS X Lion, Message authentication code, Microsoft, National Institute of Standards and Technology, NTFS, OpenBSD, OpenSSL, Plaintext, Princeton University, Pseudorandom permutation, Seth Schoen, Stream cipher, TrueCrypt, VeraCrypt, Watermarking attack, ..., Windows 10, Xor–encrypt–xor, ZFS. Expand index (3 more) »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Disk encryption theory and Advanced Encryption Standard · See more »

Adversary (cryptography)

In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data).

New!!: Disk encryption theory and Adversary (cryptography) · See more »

Alex Halderman

J.

New!!: Disk encryption theory and Alex Halderman · See more »

BestCrypt

BestCrypt is a commercial disk encryption app for Windows, Linux and OS X, developed by Jetico Inc, Oy.

New!!: Disk encryption theory and BestCrypt · See more »

BitLocker

BitLocker is a full disk encryption feature included with Windows Vista and later.

New!!: Disk encryption theory and BitLocker · See more »

Block (data storage)

In computing (specifically data transmission and data storage), a block, sometimes called a physical record, is a sequence of bytes or bits, usually containing some whole number of records, having a maximum length, a block size.

New!!: Disk encryption theory and Block (data storage) · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Disk encryption theory and Block cipher · See more »

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.

New!!: Disk encryption theory and Block cipher mode of operation · See more »

Botan (programming library)

Botan is a BSD-licensed cryptographic library written in C++.

New!!: Disk encryption theory and Botan (programming library) · See more »

Btrfs

Btrfs (pronounced as "butter fuss", "better F S", "butter F S", "b-tree F S", or simply by spelling it out) is a file system based on the copy-on-write (COW) principle, initially designed at Oracle Corporation for use in Linux.

New!!: Disk encryption theory and Btrfs · See more »

Ciphertext stealing

In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that are not evenly divisible into blocks without resulting in any expansion of the ciphertext, at the cost of slightly increased complexity.

New!!: Disk encryption theory and Ciphertext stealing · See more »

Cold boot attack

In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine.

New!!: Disk encryption theory and Cold boot attack · See more »

Confidentiality

Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.

New!!: Disk encryption theory and Confidentiality · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Disk encryption theory and Cryptographic hash function · See more »

Data at rest

Data at rest in information technology means inactive data that is stored physically in any digital form (e.g. databases, data warehouses, spreadsheets, archives, tapes, off-site backups, mobile devices etc.). Data at rest is used as a complement to the terms data in use and data in transit which together define the three states of digital data (see Figure 1).

New!!: Disk encryption theory and Data at rest · See more »

Data remanence

Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase the data.

New!!: Disk encryption theory and Data remanence · See more »

Data retrieval

Data retrieval means obtaining data from a database management system such as ODBMS.

New!!: Disk encryption theory and Data retrieval · See more »

Disk encryption hardware

The computer security technique called disk encryption is used to protect confidentiality of the data stored on a computer disk.

New!!: Disk encryption theory and Disk encryption hardware · See more »

Disk encryption software

Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption.

New!!: Disk encryption theory and Disk encryption software · See more »

Disk sector

In computer disk storage, a sector is a subdivision of a track on a magnetic disk or optical disc.

New!!: Disk encryption theory and Disk sector · See more »

DiskCryptor

DiskCryptor is a free and open-source full disk encryption system for Microsoft Windows.

New!!: Disk encryption theory and DiskCryptor · See more »

Dm-crypt

dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD.

New!!: Disk encryption theory and Dm-crypt · See more »

Edward Felten

Edward William Felten (born March 25, 1963) is a professor of computer science and public affairs at Princeton University.

New!!: Disk encryption theory and Edward Felten · See more »

Exclusive or

Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).

New!!: Disk encryption theory and Exclusive or · See more »

Ext4

The ext4 or fourth extended filesystem is a journaling file system for Linux, developed as the successor to ext3.

New!!: Disk encryption theory and Ext4 · See more »

FileVault

FileVault is a disk encryption program in Mac OS X 10.3 and later.

New!!: Disk encryption theory and FileVault · See more »

Finite field

In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements.

New!!: Disk encryption theory and Finite field · See more »

Finite field arithmetic

In mathematics, finite field arithmetic is arithmetic in a finite field (a field containing a finite number of elements) as opposed to arithmetic in a field with an infinite number of elements, like the field of rational numbers.

New!!: Disk encryption theory and Finite field arithmetic · See more »

FreeBSD

FreeBSD is a free and open-source Unix-like operating system descended from Research Unix via the Berkeley Software Distribution (BSD).

New!!: Disk encryption theory and FreeBSD · See more »

FreeOTFE

FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE).

New!!: Disk encryption theory and FreeOTFE · See more »

Galois/Counter Mode

Galois/Counter Mode (GCM) is a mode of operation for symmetric key cryptographic block ciphers that has been widely adopted because of its efficiency and performance.

New!!: Disk encryption theory and Galois/Counter Mode · See more »

Geli (software)

geli is a block device-layer disk encryption system written for FreeBSD, introduced in version 6.0.

New!!: Disk encryption theory and Geli (software) · See more »

IEEE P1619

Institute of Electrical and Electronics Engineers (IEEE) standardization project for encryption of stored data, but more generically refers to the Security in Storage Working Group (SISWG), which includes a family of standards for protection of stored data and for the corresponding cryptographic key management.

New!!: Disk encryption theory and IEEE P1619 · See more »

Initialization vector

In cryptography, an initialization vector (IV) or starting variable (SV) is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom.

New!!: Disk encryption theory and Initialization vector · See more »

Linux kernel

The Linux kernel is an open-source monolithic Unix-like computer operating system kernel.

New!!: Disk encryption theory and Linux kernel · See more »

Mac OS X Lion

Mac OS X Lion (version 10.7) is the eighth major release of Mac OS X (now named macOS), Apple's desktop and server operating system for Macintosh computers.

New!!: Disk encryption theory and Mac OS X Lion · See more »

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.

New!!: Disk encryption theory and Message authentication code · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Disk encryption theory and Microsoft · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Disk encryption theory and National Institute of Standards and Technology · See more »

NTFS

NTFS (New Technology File System) is a proprietary file system developed by Microsoft.

New!!: Disk encryption theory and NTFS · See more »

OpenBSD

OpenBSD is a free and open-source Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Disk encryption theory and OpenBSD · See more »

OpenSSL

OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end.

New!!: Disk encryption theory and OpenSSL · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Disk encryption theory and Plaintext · See more »

Princeton University

Princeton University is a private Ivy League research university in Princeton, New Jersey.

New!!: Disk encryption theory and Princeton University · See more »

Pseudorandom permutation

In cryptography, a pseudorandom permutation (PRP) is a function that cannot be distinguished from a random permutation (that is, a permutation selected at random with uniform probability, from the family of all permutations on the function's domain) with practical effort.

New!!: Disk encryption theory and Pseudorandom permutation · See more »

Seth Schoen

Seth David Schoen (born September 27, 1979) is senior staff technologist for the Electronic Frontier Foundation, a technology civil rights organisation, and has been actively involved in discussing digital copyright law and encryption since the 1990s.

New!!: Disk encryption theory and Seth Schoen · See more »

Stream cipher

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

New!!: Disk encryption theory and Stream cipher · See more »

TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).

New!!: Disk encryption theory and TrueCrypt · See more »

VeraCrypt

VeraCrypt is an open-source utility used for on-the-fly encryption (OTFE).

New!!: Disk encryption theory and VeraCrypt · See more »

Watermarking attack

In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key.

New!!: Disk encryption theory and Watermarking attack · See more »

Windows 10

Windows 10 (codenamed Redstone, formerly Threshold) is a personal computer operating system developed and released by Microsoft, as part of the Windows NT family of operating systems.

New!!: Disk encryption theory and Windows 10 · See more »

Xor–encrypt–xor

The xor–encrypt–xor (XEX) is a (tweakable) mode of operation of a block cipher.

New!!: Disk encryption theory and Xor–encrypt–xor · See more »

ZFS

ZFS is a combined file system and logical volume manager designed by Sun Microsystems and now owned by Oracle Corporation.

New!!: Disk encryption theory and ZFS · See more »

Redirects here:

CMC mode, EME mode, ESSIV, LRW mode, Liskov Rivest Wagner, Liskov-Rivest-Wagner, Lrw mode, XEX-TCB-CTS, XTS mode.

References

[1] https://en.wikipedia.org/wiki/Disk_encryption_theory

OutgoingIncoming
Hey! We are on Facebook now! »