Content deleted Content added
Corrected iStorage (removed link to no existant iStorage Page. |
Added Section on Removable Hard Drive FDE - SED moved to the Hard disk drive FDE section, as it does not apply to other types (and removed associated comment) |
||
Line 4:
}}
'''Hardware-based full disk encryption''' ('''FDE''') is available from many [[hard disk drive]] (HDD/[[Solid-state drive|SSD]]) vendors, including: [[Hitachi]], iStorage Limited, [[Seagate Technology]], [[Samsung]], [[Toshiba]], [[
Hardware-FDE has two major components: the hardware encryptor and the data store.
There are currently
#Hard disk drive (HDD) FDE (
#Enclosed hard disk drive FDE
#Removable Hard Drive FDE
#Bridge and [[Chipset]] (BC) FDE
Line 15 ⟶ 16:
==Hard disk drive FDE==
Usally referred to as '''self-encrypting drive''' ('''SED''').
HDD FDE is made by HDD vendors using the [[Opal Storage Specification|OPAL]] and Enterprise standards developed by the [[Trusted Computing Group]].<ref>{{cite web |url=http://www.trustedcomputinggroup.org/solutions/data_protection |title=Trusted Computing Group Data Protection page |publisher=Trustedcomputinggroup.org |date= |access-date=2013-08-06 |url-status=dead |archive-url=https://www.webcitation.org/65fUDqdql?url=http://www.trustedcomputinggroup.org/solutions/data_protection |archive-date=2012-02-23 |df= }}</ref> [[Key management]] takes place within the hard disk controller and encryption keys are 128 or 256 [[bit]] [[Advanced Encryption Standard]] (AES) keys. [[Authentication]] on power up of the drive must still take place within the [[Central processing unit|CPU]] via either a [[software]] [[pre-boot authentication]] environment (i.e., with a [[Disk encryption software|software-based full disk encryption]] component - hybrid full disk encryption) or with a [[BIOS]] password.
[[Hitachi]], [[Micron Technology|Micron]], [[Seagate Technology|Seagate]], [[Samsung]], and [[Toshiba]] are the disk drive manufacturers offering [[Trusted Computing Group|TCG]] [[Opal Storage Specification|OPAL]] [[Serial ATA|SATA]] drives. Older technologies include the proprietary Seagate DriveTrust, and the older, and less secure, [[Parallel ATA|PATA]] Security command standard shipped by all drive makers including [[Western Digital]]. Enterprise SAS versions of the TCG standard are called "TCG Enterprise" drives.
==Enclosed hard disk drive FDE==
Within a standard [[Harddrive#Form factors|hard drive form factor]] case
*The enclosed hard disk drive's case can be [[tamper-evident]], so when retrieved the user can be assured that the [[Data breach|data has not been compromised]].
*The encryptors electronics including the [[Cryptographic key|key]] store and integral hard drive
*The key can be purged, allowing a user to prevent his [[Authentication factors#Authentication factors|authentication parameters]] being used without destroying the encrypted data. Later the same [[Cryptographic key|key]] can be re-loaded into the Enclosed hard disk drive FDE, to retrieve this data.
*Tampering is not an issue for SEDs as they cannot be read without the decryption key, regardless of access to the internal electronics {{Clarify|reason=see Talk page, decryption keys can be recovered from the internal electornics in several cases|date=July 2016}}.
For example, [[ViaSat
==Removable Hard Drive FDE==
The Inserted [[hard disk drive|Hard Drive]] FDE allows a standard [[List of disk drive form factors|form factor]] [[hard disk drive]] to be inserted into it. The concept can be seen on <ref>{{cite web |title=Removable Drives |url=https://www.cru-inc.com/industries/removables/ |website=www.Cru-inc.com |publisher=CRU |accessdate=2020-05-15}}</ref>
*This is an improvement on removing [unencrypted] [[hard disk drive|hard drives]] from a [[computer]] and storing them in a [[safe]] when not in use.
*This design can be used to encrypt multiple [[hard disk drive|drives]] using the same [[Cryptographic key|key]].
*Generally they are not securely locked<ref>{{cite web |title=Sapphire Cipher Snap-In |url=https://www.addonics.com/products/ssna256eu.php |website=Addonics.com |publisher=Addonics |accessdate=2020-05-15}}</ref> so the drive's interface is open to attack.
==Chipset FDE==
Line 71 ⟶ 80:
{{Reflist}}
[[Category:Disk encryption]]
|