Abstract
This paper introduces a new block cipher, and discusses its security. Its design is optimized for high-bandwidth applications that do not have high requirements on key-schedule latency. This paper also discusses several security issues about such an application: harddisk encryption.
Chapter PDF
Similar content being viewed by others
References
The Advanced Encryption Standard, http://www.nist.gov/aes/
Bruce Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), Lecture Notes in Computer Science, Advances in Cryptology, proceedings of Fast Software Encryption 93, Springer-Verlag, 1994, pp. 191–204.
Jacques Stern and Serge Vaudenay, CS-Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of Fast Software Encryption 98, Springer-Verlag, 1998, pp. 189–205.
Eli Biham, A Fast New DES Implementation in Software, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of Fast Software Encryption 97, Springer-Verlag, 1997, pp. 260–272.
The Alpha OEM web site, http://www.digital.com/semiconductor/alpha/alpha.htm
The IA-64 web site, http://www.intel.com/eBusiness/products/ia64/index.htm
Donald E. Knuth, The Art of Computer Programming, Volume 3, Addison-Wesley, 1973, pp. 7 and 573.
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’96, Springer-Verlag, 1996, pp. 104–113.
The DES Challenge web site, http://www.distributed.net/des/
Ross Anderson, Eli Biham and Lars Knudsen, Serpent: A New Block Cipher Proposal, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of Fast Software Encryption 98, Springer-Verlag, 1998, pp. 222–238.
The SHA-1 specification, FIPS 180-1, http://www.itl.nist.gov/fipspubs/fip180-1.htm
Donald E. Knuth, The Art of Computer Programming, Volume 2, Addison-Wesley, (2nd ed.), 1997, p. 139.
Donald E. Knuth, The Art of Computer Programming, Volume 1, Addison-Wesley, 1969, pp. 177–179.
Thomas Pornin, Automatic Software Optimization of Block Ciphers using Bitslicing Techniques, unpublished, http://www.di.ens.fr/~pornin/bitslice.ps
AES: best encryption timings for the submissions, http://www.di.ens.fr/~granboul/recherche/AES/timings.html
The Xilinx web site, http://www.xilinx.com/
The OpenBSD web site, http://www.openbsd.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pornin, T. (2001). Transparent Harddisk Encryption. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1_23
Download citation
DOI: https://doi.org/10.1007/3-540-44709-1_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42521-2
Online ISBN: 978-3-540-44709-2
eBook Packages: Springer Book Archive