TRESOR Runs Encryption Securely Outside RAM.

SEC'11: Proceedings of the 20th USENIX conference on Security(2011)

引用 68|浏览102
暂无评分
摘要
Current disk encryption techniques store necessary keys in RAM and are therefore susceptible to attacks that target volatile memory, such as Firewire and cold boot attacks. We present TRESOR, a Linux kernel patch that implements the AES encryption algorithm and its key management solely on the microprocessor. Instead of using RAM, TRESOR ensures that all encryption states as well as the secret key and any part of it are only stored in processor registers throughout the operational time of the system, thereby substantially increasing its security. Our solution takes advantage of Intel's new AES-NI instruction set and exploits the x86 debug registers in a non-standard way, namely as cryptographic key storage. TRESOR is compatible with all modern Linux distributions, and its performance is on a par with that of standard AES implementations.
更多
查看译文
关键词
AES encryption algorithm,cryptographic key storage,current disk encryption technique,encryption state,key management,necessary key,secret key,Linux kernel patch,modern Linux distribution,standard AES implementation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要