IEEE 1619.1-2018
$47.67
IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices
Published By | Publication Date | Number of Pages |
IEEE | 2018 | 55 |
Revision Standard – Active. Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 1619.1™-2018 Front cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
7 | Participants |
8 | Introduction |
9 | Contents |
10 | 1. Overview 1.1 Scope 1.2 Purpose 1.3 Description of clauses and annexes |
11 | 2. Normative references 3. Definitions, acronyms, abbreviations, etc. 3.1 Definitions |
14 | 3.2 Acronyms and abbreviations |
15 | 3.3 Mathematical conventions 4. General concepts 4.1 Introduction |
16 | 4.2 Components |
18 | 4.3 Plaintext record formatter 4.4 Plaintext record de-formatter |
19 | 4.5 Encryption routine |
20 | 4.6 Decryption routine |
21 | 4.7 Cryptographic parameters |
22 | 5. Cryptographic modes 5.1 Overview |
23 | 5.2 Counter with cipher block chaining-message authentication code (CCM) 5.3 Galois/Counter Mode (GCM) |
24 | 5.4 Cipher block chaining with keyed-hash message authentication code (CBC-HMAC) |
26 | 5.5 Xor-encrypt-xor with tweakable block-cipher with keyed-hash message authentication code (XTS-HMAC) |
27 | 6. Cryptographic key management and initialization vector requirements 6.1 Random bit generator |
28 | 6.2 Cryptographic key entry and export 6.3 Handling the cipher key 6.4 Cryptographic key wrapping on the storage medium |
29 | 6.5 Initialization vector (IV) requirements |
30 | 6.6 Creating unique IVs within a self-contained group |
32 | Annex A (informative) Bibliography |
34 | Annex B (informative) Security concerns B.1 Threat model B.2 Maintaining cryptographic key security |
35 | B.3 Replay attacks B.4 Passing plaintext to the host before checking the MAC |
36 | B.5 Checking for integrity of a cryptographic key B.6 Avoiding collisions of initialization vectors |
37 | B.7 Examples of IV collision avoidance strategies |
38 | B.8 How many records to encrypt with one key? |
40 | Annex C (informative) Documentation summary |
41 | Annex D (informative) Test vectors D.1 General |
42 | D.2 CCM-128-AES-256 test vectors |
44 | D.3 GCM-128-AES-256 test vectors |
46 | D.4 CBC-AES-256-HMAC-SHA test vectors (including HMAC-SHA-1, HMAC-SHA-256, and HMAC-SHA-512) |
50 | D.5 XTS-AES-256-HMAC-SHA-512 test vectors |
55 | Back cover |