Hardware-based full disk encryption: Difference between revisions

Content deleted Content added
Chipset FDE: The Link is dead (404)
Tag: references removed
No edit summary
Line 1:
'''Hardware-based [[Fullfull Diskdisk Encryptionencryption]]''' is available from all of the [[hard disk drive]] (HDD) vendors, including [[Seagate Technology]], [[Hitachi, Ltd.]], [[Samsung]] and [[Toshiba]] and also by [[solid state drive]] vendors such as [[Samsung]]. The [[Symmetric-key algorithm|symmetric encryption key]] is maintained independently from the [[Central processing unit|CPU]], thus removing computer memory as a potential attack vector.
 
There are currently two varieties of hardware-FDE being discussed:
Line 6:
#Bridge and Chipset (BC) FDE
 
==Hard Diskdisk Drivedrive FDE==
HDD FDE is available from all HDD vendors using the OPAL and Enterprise standards via the [[Trusted Computing Group]].<ref>[https://www.trustedcomputinggroup.org/ Trusted Computing Group: Home<!-- Bot generated title -->]</ref> [[Key management]] takes place within the hard disk controller and encryption keys are 128 or 256 [[Binary digit|bit]] [[Advanced Encryption Standard]] keys. [[Authentication]] on power up of the drive must still take place within the [[CPU]] via either a [[software]] [[Pre-Boot Authentication]] Environment (i.e., with a [[Software-based Full Disk Encryption]] component - [[Hybrid Full Disk Encryption]]) or with a [[BIOS]] password.
 
Line 17:
[[Intel]] announced the release of the Danbury chipset<ref>[http://www.theregister.co.uk/2007/09/21/intel_vpro_danbury/ www.theregister.co.uk/2007/09/21/intel_vpro_danbury/]</ref> but has since abandoned this approach.
 
==Feature - Benefitsfenefits==
 
Hardware based encryption when it is built into the drive or within the drive enclosure is notably transparent to the user. The drive except for bootup authentication operates just like any drive with no degradation in performance. Unlike software FDE, there is no complication since all the encryption is invisible to the operating system.
Line 27:
With Cryptographic Disk Erasure the drive is commanded, with proper authentication credentials, to self-generate a new media encryption key and go into a 'new drive' state. Unlike other forms of sanitization, this action takes a few milliseconds at most. So a drive can be safely repurposed very quickly.
 
===Security Challengeschallenges===
 
* Pure hardware-based FDE does not have any strong authentication component