Hardware-based full disk encryption: Difference between revisions

Content deleted Content added
Dids (talk | contribs)
Hard Disk Drive FDE: Deleted inaccurate speculation
Dids (talk | contribs)
Hard Disk Drive FDE: Reworded vague statement on key length
Line 7:
 
==Hard Disk Drive FDE==
HDD FDE is available from all HDD vendors using the OPAL and Enterprise standards via the [[Trusted Computing Group]].<ref>[https://www.trustedcomputinggroup.org/ Trusted Computing Group: Home<!-- Bot generated title -->]</ref> [[Key management]] takes place within the HDDhard disk controller and encryption keys are encrypted using the a cryptologically strong passcode of up to 32256 [[ByteBinary digit|bytesbit]] (256 [[BinaryAdvanced digit|bitsEncryption Standard]]) keys. [[Authentication]] on power up of the drive must still take place within the [[CPU]] via either a [[software]] [[Pre-Boot Authentication]] Environment or with a [[BIOS]] password.
 
[[Hitachi]], [[Seagate]], [[Samsung]], [[Toshiba]], [[Western Digital]] are the disk drive manufacturers offering [[Trusted Computing Group|TCG]] OPAL [[Serial ATA |SATA]] drives as well as the older, and less secure, [[Parallel ATA|PATA]] Security command standard. All drive makers have suggested the appropriate term for this new class of device and new type of functionality be "self-encrypting drives."