>>if you decrypt with the wrong key, the CRC will be wrong... Does the WG >>expect to be able to make a copy or an image backup of a disk without >>knowledge of the key? As I repeatedly tried to explain, the drive must not return any data if the wrong key is given. It would allow traffic analysis, where LRW is especially weak.
Laszlo > -------- Original Message -------- > Subject: RE: the extra 8 bytes.... > From: "Elliott, Robert (Server Storage)" <[EMAIL PROTECTED]> > Date: Tue, December 20, 2005 12:49 pm > To: "SISWG" <[EMAIL PROTECTED]> > > The drive could just not store anything in the field, and calculate > the CRC during the read command based on whatever data is being > transmitted. This means the CRC just has value for transmission > purposes, not storage. > > Encrypting the CRC, on the other hand, preserves some value for > storage purposes. However, if you decrypt with the wrong key, > the CRC will be wrong. This would complicate reading data from > a disk if you don't know the key - you'd have to disable CRC > checking in the read command. Does the WG expect to be able to > make a copy or an image backup of a disk without knowledge of > the key? > > -- > Rob Elliott, [EMAIL PROTECTED] > Hewlett-Packard Industry Standard Server Storage Advanced Technology > https://ecardfile.com/id/RobElliott > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > > Behalf Of [EMAIL PROTECTED] > > Sent: Tuesday, December 20, 2005 11:19 AM > > To: SISWG > > Subject: RE: the extra 8 bytes.... > > > > >> ... the drive needs to encrypt the 512 bytes of user data, > > calculate the CRC of the encrypted data, and store that value > > rather than the plaintext CRC. > > > > As I said several times, there is no need for a CRC over the encrypted > > data. The disk drive has internal error correction, so more powerful > > measures are taken in the background, anyway. Also, this CRC is > > meaningless for the decrypted data, which is provided by the drive, so > > it is useless. Furthermore, the firmware is not fast enough for a CRC > > so computing this useless information would necessitate further HW > > changes. > > > > Laszlo > > > > > -------- Original Message -------- > > > Subject: RE: the extra 8 bytes.... > > > From: "Elliott, Robert (Server Storage)" <[EMAIL PROTECTED]> > > > Date: Tue, December 20, 2005 10:35 am > > > To: "SISWG" <[EMAIL PROTECTED]> > > > > > > > -----Original Message----- > > > > From: David McGrew [mailto:[EMAIL PROTECTED] > > > > Sent: Tuesday, December 20, 2005 8:18 AM > > > > To: Elliott, Robert (Server Storage) > > > > Cc: SISWG > > > > Subject: Re: the extra 8 bytes.... > > > > > > > > Robert, > > > > > > > > On Dec 15, 2005, at 8:44 PM, Elliott, Robert (Server > > Storage) wrote: > > > > > > > > > > > > > >> -----Original Message----- > > > > >> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > > > > >> Behalf Of [EMAIL PROTECTED] > > > > >> Sent: Thursday, December 15, 2005 9:49 PM > > > > >> To: SISWG > > > > >> Subject: RE: the extra 8 bytes.... > > > > >> > > > > >> Rob, what is your point? > > > > > > > > > > Since the 520 topic is under discussion, I want to > > ensure everyone > > > > > understands the difference between 520 byte formatted disks and > > > > > 512+protection information formatted disks. > > > > > > > > > >> Should the standard differentiate between SW > > > > >> and HW implementations? The drive does not know if part of > > > > a block is > > > > >> protection information or data, therefore it must encrypt > > > > everything. > > > > > > > > > > For drives formatted with 520 byte logical blocks, that's true. > > > > > > > > > > For drives formatted with 512 byte + protection > > information logical > > > > > blocks, that's not true. The drive understands the > > contents of the > > > > > protection information. > > > > > > > > > > It might encrypt the extra 8 (losing compatibility with SW > > > > encryption) > > > > > or it might not (maintaining compatiblity). I'm not sure > > > > > compatiblity is > > > > > crucial, but understanding the difference seems important. > > > > > > > > If the extra 8 bytes is left unencrypted, would that mean > > that there > > > > is a CRC of the plaintext that is left in the clear? > > > > > > > > thanks, > > > > > > > > David > > > > > > > > > > Correct - and that leaks information. That's why (as mentioned > > > earlier in the thread) the drive needs to encrypt the 512 bytes > > > of user data, calculate the CRC of the encrypted data, and store > > > that value rather than the plaintext CRC. > > > > > > From several messages earlier: > > > > >>> A drive with protection information needs to avoid storing > > > > >>> the plaintext CRC; it can store the CRC of the encrypted > > > > >>> user data instead. If it does not encrypt the Tag fields, > > > > >>> it is compatible with an application performing encryption. > > > > > > -- > > > Rob Elliott, [EMAIL PROTECTED] > > > Hewlett-Packard Industry Standard Server Storage Advanced Technology > > > https://ecardfile.com/id/RobElliott > >