The Analysis of Windows Vista Disk Encryption Algorithm

نویسندگان

  • Mohamed Abo El-Fotouh
  • Klaus Diepold
چکیده

Windows Vista Enterprise and Ultimate editions use Bitlocker Drive Encryption as its disk encryption algorithm, and at its heart is the AES-CBC + Elephant diffuser encryption algorithm (ELEPHANT). In this paper we present our analysis of ELEPHANT using statistical tests. Our analysis has explored some weaknesses in its diffusers, thus we propose new diffusers to replace them. The new diffusers overcome the weaknesses of the original ones, and offer better and faster diffusion properties. We used the new diffusers to build variants of ELEPHANT, that possess better diffusion properties.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms

The world of digital communications is expanding day by day, For secure communications over the unsecure mediums, Cryptography plays a crucial role and Symmetric Encryption algorithms do the real part of encoding data before transmission. The deep analysis of their security and speed become the necessity of safe digital communication. In this paper, we study the two popular symmetric cryptograp...

متن کامل

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications

We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We find that the Windows Vista operating system itself, Microsoft Word, and Google Desktop all compromise the deniability of a TrueCrypt DFS. While staged in the context of TrueCrypt, our research highlights several fundamen...

متن کامل

Performance Evaluation of Recent Windows Operating Systems

The primary goal of most OSs (Operating Systems) is the efficient use of computer systems software and hardware resources. Since Windows OSs are most widely used OS for personal computers, they need to satisfy needs of all different kind of computer systems users. In comparison with Windows XP, new versions of the Windows OS; namely Windows Vista and Windows 7, introduce a number of new feature...

متن کامل

Implementing BitLocker Drive Encryption for forensic analysis

This paper documents the BitLocker Drive Encryption system included with some versions of Microsoft’s Windows Vista. In particular it describes the key management system, the algorithms and modes used, and the metadata format. Particular attention is given to methods forensic examiners can use to access protected data. There are some unanswered questions about how the cryptosystem operates, inc...

متن کامل

A Performance Comparison of Ciphering Algorithms with the sWIFI Algorithm

Ciphering algorithms play a main role in WLAN security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the WLAN security issue, a novel method has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. This paper also provides evaluation of five ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008