Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
8Activity

Table Of Contents

Disk encryption theory
Aloaha
BestCrypt
BitLocker Drive Encryption
BitLocker Drive Encryption [1]
Cold boot attack
Comparison of disk encryption software
Comparison of encrypted external drives
cryptmount
Disk encryption
Disk encryption hardware
Disk encryption software
DiskCryptor
dm-crypt
EncFS
Encryption layer in storage stack
Filesystem-level encryption
FileVault
FreeOTFE
GBDE
Geli (software)
Hardware-based full disk encryption
IEEE P1619
Linux Unified Key Setup
List of cryptographic file systems
On-the-fly encryption
PGPDisk
Private Disk
Scramdisk
Sentry 2020
Transparent Data Encryption
TrueCrypt
Trusted Storage specification
United States v. Boucher
USB flash drive security
Watermarking attack
Block cipher modes of operation
AEAD block cipher modes of operation
CBC-MAC
CCM mode
CWC mode
EAX mode
Galois/Counter Mode
Initialization vector
OCB mode
Block cipher
Cipher security summary
3-Way
ABC (block cipher)
Advanced Encryption Standard
Akelarre (cipher)
Anubis (cipher)
ARIA (cipher)
BaseKing
BaseKing
BassOmatic
BATON
Blowfish (cipher)
Camellia (cipher)
CAST-128
CAST-256
Cellular Message Encryption Algorithm
CIKS-1
CIPHERUNICORN-A
CIPHERUNICORN-E
CLEFIA
Cobra ciphers
COCONUT98
Content Scramble System
Content Scramble System (CSS)
Crab (cipher)
Cryptomeria cipher
CRYPTON
CS-Cipher
Data Encryption Standard
DEAL
DFC (cipher)
FEAL
Format-preserving encryption
FROG
GDES
GOST (block cipher)
Grand Cru (cipher)
Hasty Pudding cipher
Hasty Pudding Cipher
Hierocrypt
Hierocrypt-L1
Hierocrypt-3
IAPM (mode)
ICE (cipher)
Idea NXT
Injected-Block Cipher RBSC algorithm
Intel Cascade Cipher
Intel Cascaded Cipher
International Data Encryption Algorithm
Iraqi block cipher
KeeLoq
Key whitening
KFB mode
KHAZAD
Khazad
Khufu and Khafre
KN-Cipher
Ladder-DES
Libelle (cipher)
LOKI97
MacGuffin (cipher)
MAGENTA
MARS (cryptography)
Mercy (cipher)
MESH (cipher)
MISTY1
MULTI2
MultiSwap
New Data Seal
NewDES
Nimbus (cipher)
NOEKEON
Noekeon
NUSH
Product cipher
Q (cipher)
Red Pike (cipher)
REDOC
S-1 block cipher
SAFER
SAVILLE
SC2000
SEED
Serpent (cipher)
SHACAL
SHARK
Skipjack (cipher)
SMS4
Spectr-H64
Square (cipher)
Substitution-permutation network
SXAL/MBAL
Threefish
Tiny Encryption Algorithm
Treyfer
Triple DES
Twofish
UES (cipher)
Xenon (cipher)
XTEA
P. 1
Disk Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Disk Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Ratings: (0)|Views: 1,228 |Likes:
Published by Emereo Publishing
Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk). This book presents cryptographic aspects of the problem and different software packages and hardware devices devoted to this problem like disk encryption software and disk encryption hardware.

This book is your ultimate resource for Disk Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Disk Encryption right away, covering: Disk encryption theory, Aloaha, BestCrypt, BitLocker Drive Encryption, Cold boot attack, Comparison of disk encryption software, Comparison of encrypted external drives, Cryptmount, Disk encryption, Disk encryption hardware, Disk encryption software, DiskCryptor, Dm-crypt, E4M, ECryptfs, EncFS, Encryption layer in storage stack, Filesystem-level encryption, FileVault, FreeOTFE, GBDE, Geli (software), Hardware-based full disk encryption, IEEE P1619, Linux Unified Key Setup, List of cryptographic file systems, On-the-fly encryption, PGPDisk, Private Disk, Scramdisk, Sentry 2020, Transparent Data Encryption, TrueCrypt, Trusted Storage specification, United States v. Boucher, USB flash drive security, Watermarking attack, Block cipher modes of operation, AEAD block cipher modes of operation, CBC-MAC, CCM mode, CWC mode, EAX mode, Galois/Counter Mode, Initialization vector, OCB mode, Block cipher, Cipher security summary, 3-Way, ABC (block cipher), Advanced Encryption Standard, Akelarre (cipher), Anubis (cipher), ARIA (cipher), BaseKing, BassOmatic, BATON, Blowfish (cipher), Camellia (cipher), CAST-128, CAST-256, Cellular Message Encryption Algorithm, CIKS-1, CIPHERUNICORN-A, CIPHERUNICORN-E, CLEFIA, Cobra ciphers, COCONUT98, Content Scramble System, Crab (cipher), Cryptomeria cipher, CRYPTON, CS-Cipher, Data Encryption Standard, DEAL, DFC (cipher), E2 (cipher), FEA-M, FEAL, Format-preserving encryption, FROG, GDES, GOST (block cipher), Grand Cru (cipher), Hasty Pudding cipher, Hierocrypt, IAPM (mode), ICE (cipher), Idea NXT, Injected-Block Cipher RBSC algorithm, Intel Cascade Cipher, International Data Encryption Algorithm, Iraqi block cipher, KeeLoq, Key whitening, KFB mode, KHAZAD, Khufu and Khafre, KN-Cipher, Ladder-DES, Libelle (cipher), LOKI97, M6 (cipher), M8 (cipher), MacGuffin (cipher), MAGENTA, MARS (cryptography), Mercy (cipher), MESH (cipher), MISTY1, MMB, MULTI2, MultiSwap, New Data Seal, NewDES, Nimbus (cipher), NOEKEON, NUSH, Product cipher, Q (cipher), RC2, RC5, RC6, Red Pike (cipher), REDOC, S-1 block cipher, SAFER, SAVILLE, SC2000, SEED, Serpent (cipher), SHACAL, SHARK, Skipjack (cipher), SMS4, Spectr-H64, Square (cipher), Substitution-permutation network, SXAL/MBAL, Threefish, Tiny Encryption Algorithm, Treyfer, Triple DES, Twofish, UES (cipher), Xenon (cipher), Xmx, XTEA, XXTEA, Zodiac (cipher)

This book explains in-depth the real drivers and workings of Disk Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Disk Encryption with the objectivity of experienced professionals.
Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk). This book presents cryptographic aspects of the problem and different software packages and hardware devices devoted to this problem like disk encryption software and disk encryption hardware.

This book is your ultimate resource for Disk Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Disk Encryption right away, covering: Disk encryption theory, Aloaha, BestCrypt, BitLocker Drive Encryption, Cold boot attack, Comparison of disk encryption software, Comparison of encrypted external drives, Cryptmount, Disk encryption, Disk encryption hardware, Disk encryption software, DiskCryptor, Dm-crypt, E4M, ECryptfs, EncFS, Encryption layer in storage stack, Filesystem-level encryption, FileVault, FreeOTFE, GBDE, Geli (software), Hardware-based full disk encryption, IEEE P1619, Linux Unified Key Setup, List of cryptographic file systems, On-the-fly encryption, PGPDisk, Private Disk, Scramdisk, Sentry 2020, Transparent Data Encryption, TrueCrypt, Trusted Storage specification, United States v. Boucher, USB flash drive security, Watermarking attack, Block cipher modes of operation, AEAD block cipher modes of operation, CBC-MAC, CCM mode, CWC mode, EAX mode, Galois/Counter Mode, Initialization vector, OCB mode, Block cipher, Cipher security summary, 3-Way, ABC (block cipher), Advanced Encryption Standard, Akelarre (cipher), Anubis (cipher), ARIA (cipher), BaseKing, BassOmatic, BATON, Blowfish (cipher), Camellia (cipher), CAST-128, CAST-256, Cellular Message Encryption Algorithm, CIKS-1, CIPHERUNICORN-A, CIPHERUNICORN-E, CLEFIA, Cobra ciphers, COCONUT98, Content Scramble System, Crab (cipher), Cryptomeria cipher, CRYPTON, CS-Cipher, Data Encryption Standard, DEAL, DFC (cipher), E2 (cipher), FEA-M, FEAL, Format-preserving encryption, FROG, GDES, GOST (block cipher), Grand Cru (cipher), Hasty Pudding cipher, Hierocrypt, IAPM (mode), ICE (cipher), Idea NXT, Injected-Block Cipher RBSC algorithm, Intel Cascade Cipher, International Data Encryption Algorithm, Iraqi block cipher, KeeLoq, Key whitening, KFB mode, KHAZAD, Khufu and Khafre, KN-Cipher, Ladder-DES, Libelle (cipher), LOKI97, M6 (cipher), M8 (cipher), MacGuffin (cipher), MAGENTA, MARS (cryptography), Mercy (cipher), MESH (cipher), MISTY1, MMB, MULTI2, MultiSwap, New Data Seal, NewDES, Nimbus (cipher), NOEKEON, NUSH, Product cipher, Q (cipher), RC2, RC5, RC6, Red Pike (cipher), REDOC, S-1 block cipher, SAFER, SAVILLE, SC2000, SEED, Serpent (cipher), SHACAL, SHARK, Skipjack (cipher), SMS4, Spectr-H64, Square (cipher), Substitution-permutation network, SXAL/MBAL, Threefish, Tiny Encryption Algorithm, Treyfer, Triple DES, Twofish, UES (cipher), Xenon (cipher), Xmx, XTEA, XXTEA, Zodiac (cipher)

This book explains in-depth the real drivers and workings of Disk Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Disk Encryption with the objectivity of experienced professionals.

More info:

Published by: Emereo Publishing on Aug 18, 2011
Copyright:Traditional Copyright: All rights reserved
List Price: $39.95

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
Full version available to subscribers
See more
See less

04/05/2014

You're Reading a Free Preview
Pages 4 to 51 are not shown in this preview.
You're Reading a Free Preview
Pages 55 to 187 are not shown in this preview.
You're Reading a Free Preview
Pages 191 to 233 are not shown in this preview.
You're Reading a Free Preview
Pages 237 to 303 are not shown in this preview.
You're Reading a Free Preview
Pages 307 to 323 are not shown in this preview.

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
BSASciti liked this
Lars Wirfelt liked this
Muskan Suthar liked this
Rajesh Radhakrishnan added this note
:)
Joseph Andy liked this

You're Reading a Free Preview

Download