What Users Should Know About Full Disk Encryption Based on LUKS

نویسندگان

  • Simone Bossi
  • Andrea Visconti
چکیده

Mobile devices, laptops, and USB memory usually store large amounts of sensitive information frequently unprotected. Unauthorized access to or release of such information could reveal business secrets, users habits, non-public data or anything else. Full Disk Encryption (FDE) solutions might help users to protect sensitive data in the event that devices are lost or stolen. In this paper we focus on the security of Linux Unified Key Setup (LUKS) specifications, the most common FDE solution implemented in Linux based operating systems. In particular, we analyze the key management process used to compute and store the encryption key, and the solution adopted to mitigate the problem of brute force attacks based on weak user passwords. Our testing activities show that unwitting users can significantly reduce the security of a LUKS implementation by setting specific hash functions and aggressive power management options.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P-138: What Should We Know about Ethical Problem in ART? A Study of Systematic Review

Background: Advances in medical technology have had major impacts on human reproduction. The development of effective contraceptive methods has reduced unwanted fertility, and the development of a variety of drugs and procedures has, for the first time, permitted women with fertility problems to reasonably expect that they can fulfill their desires to have children. So, The aim of this review a...

متن کامل

Android 7 File Based Encryption and the Attacks Against It

Android users have been provided with some level of disk encryption since Android 3.0 “Honeycomb”. This is marketed as ‘Full Disk’ encryption (FDE). FDE allows users to encrypt their /data partition. The major problem with FDE is that after rebooting, multiple critical functions of the device are unusable without user interaction. File Based encryption (FBE) was introduced to overcome this issu...

متن کامل

What every pediatrician should know about liver transplantation

Liver transplantation is the treatment of choice for children with end-stage liver disease.  Improvement in outcomes (allograft and patient survival) has led to widespread use of pediatric LT worldwide. This success is due to improvement in patient selection, transplant surgery, anesthesia/postoperative care and immunosuppression management. This review will focus on different aspects of LT whi...

متن کامل

Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)

We initiate the study of sanitizable signatures over encrypted data. While previous solutions for sanitizable signatures require the sanitizer to know, in clear, the original message-signature pair in order to generate the new signature, we investigate the case where these data should be hidden from the sanitizer and how this can be achieved with encryption. We call this primitive sanitizable s...

متن کامل

Anesthetic Considerations for Alcohol Using Patients

Alcohol use poses a variety of health complications. Because alcohol consumption in the days prior to surgery can induce lower blood pressure, the anesthesiologist will need to monitor blood pressure very closely during surgery to prevent hypotension. Before surgery, it is important for anesthesiologist to be aware about the amount and timing of recent alcohol consumption. Less anesthesia shoul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2015