OK, sorry if the subject line is misleading.

Is LRW really intended only for "removable sector based storage
devices"??
That's certainly not what the current draft says!
Here's a quote from the Intro page:

  Introduction
    The purpose of IEEE1619 standard is to describe the method of
encryption  
    for data-at-rest in sector-based devices. In particular, the
standard specifies 
    the encryption transform and a method for exporting/importing
encryption keys 
    for compatibility between different implementations. Encryption of
data-in-flight 
    is not covered by this standard. 
    This standard defines the LRW-AES tweakable block cipher and its use
for 
    encryption of sector-based storage. 

I never understood the LRW discussions were only for removable media.
I suspect that many others, including industry folks who have not
participated
in the P1619 discussions directly, have the same (mis?) understanding.


> -----Original Message-----
> From: [email protected] 
> [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED]
> Sent: Monday, March 27, 2006 12:49 PM
> To: [EMAIL PROTECTED]
> Subject: RE: P1619 - non-removable
> 
> Doug,
> 
> I fully agree with your critics on LRW-AES, although the subject line
> (non-removable) is a bit misleading. Landon and I raised this 
> lack of documentation issue several times in the reflector, 
> but there seems to be no volunteer to fix the problem. 
> Seagate, my employer is not involved in the tape business, 
> nor in removable sector based storage devices (where LRW is 
> applicable), so I cannot justify the time necessary for 
> writing such a document. Somebody with vested interest in 
> CD/DVD/Zip drives or external encryption boxes, controllers 
> should take the task to clear things up.
> 
> There are constraints, which were never explained, like why 
> length preserving is an absolute requirement, why one must 
> not encrypt more than 2^50 bits with one key, etc. These 
> should all go into a Backgrounds document, maybe together 
> with the threat models, attack scenarios.
> 
> Laszlo
> 
> > -------- Original Message --------
> > Subject: RE: P1619 - non-removable
> > From: "Doug Whiting" <[EMAIL PROTECTED]>
> > Date: Mon, March 27, 2006 3:17 pm
> > To: <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
> > 
> > > Do you mean Chapter 8, Attack Scenarios, is not precise, not 
> > > complete or incomprehensible? Please suggest 
> improvements, additions 
> > > to it.
> >  
> > I mean for the LRW stuff. I wasn't commenting on your doc, which is 
> > perhaps a good start (but it's less than two pages long).  However, 
> > there's nowhere I know of that addresses how LRW deals with 
> these (or
> > other) threats. 
> > 
> > > What threat do you see? If read access is only provided with full 
> > > authentication, or it requires destruction of the drive, only one 
> > > snapshot can be taken.
> > 
> > In your model, that may be true. But for LRW, I don't know 
> that that 
> > is the model we are providing or assuming. My point is, I 
> don't know 
> > what model we are assuming.
> > 
> > 
> > > -----Original Message-----
> > > From: [email protected]
> > > [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED]
> > > Sent: Monday, March 27, 2006 12:02 PM
> > > To: [EMAIL PROTECTED]
> > > Subject: RE: P1619 - non-removable
> > > 
> > > Doug,
> > > 
> > > >> careful about considering any variant of counter mode for 
> > > >> update-in-place storage applications
> > > 
> > > What threat do you see? If read access is only provided with full 
> > > authentication, or it requires destruction of the drive, only one 
> > > snapshot can be taken.
> > > 
> > > >> I'm still not quite sure that I fully understand what
> > > threats we are
> > > >> trying to protect against
> > > 
> > > Do you mean Chapter 8, Attack Scenarios, is not precise, not 
> > > complete or incomprehensible? Please suggest 
> improvements, additions 
> > > to it.
> > > 
> > > >> we owe the world a careful and coherent threat model document
> > > 
> > > Chapter 8 was meant as a draft for it. If it ever gets cleaned up 
> > > enough, we can put it in a separate document, but I 
> thought it could 
> > > remain a chapter in the Backgrounds document.
> > > 
> > > Laszlo
> > > 
> > > > -------- Original Message --------
> > > > Subject: RE: P1619 - non-removable
> > > > From: "Doug Whiting" <[EMAIL PROTECTED]>
> > > > Date: Mon, March 27, 2006 1:13 pm
> > > > To: "Matt Ball" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>, 
> > > > <[EMAIL PROTECTED]>
> > > > 
> > > >      RE: P1619 - non-removable   
> > > >  
> > > > FWIW, I think we should be extremely careful about
> > > considering any variant of counter mode for 
> update-in-place storage 
> > > applications (e.g., disk). While GCM can be used 
> securely, the GCM 
> > > IV has to be unique not only across blocks and vendors, but also 
> > > across rewrites. Thus, you need a unique IV stored within 
> the block 
> > > itself (e.g., a write counter). So it adds even more 
> overhead to the 
> > > block. While this may be acceptable, it must be very explicitly 
> > > considered and specified, as a "naive" application of GCM 
> (e.g., IV 
> > > = sector number + vendor ID) has serious potential security 
> > > problems.
> > > >   
> > > > But of course all of this gets back somewhat to the threat
> > > model. I'm still not quite sure that I fully understand 
> what threats 
> > > we are trying to protect against. While I understand that a 
> > > standards document perhaps should specify only "what to 
> write" and 
> > > not necessarily the underlying rationale, I remain uncomfortable 
> > > with the lack of an accompanying threat model document (or have I 
> > > missed it?). Clearly, non-expanding encryption like LRW 
> would NEVER 
> > > be recommended by a cryptographer in a vaccum, but the 
> constraints 
> > > here are very tight so we have littte choice. Thus, I 
> think we owe 
> > > the world a careful and coherent threat model document, or the 
> > > industry will misunderstand and possibly misuse the
> > > standard(s) that we produce. 
> > > > 
> > > >   
> > > >    
> > > > From: [email protected] on behalf of Matt Ball
> > > > Sent: Mon 3/27/2006 9:25 AM
> > > > To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
> > > > Subject: RE: P1619 - non-removable
> > > > 
> > > >  
> > > >  
> > > > 
> > > > I'm resending this message because it was rejected by 
> the e-mail 
> > > > server.  I noticed that this has happened to other 
> people as well.
> > > > Here is an error message that Jim forwarded to me after the last
> > > > meeting:
> > > > 
> > > >         The enclosed message, found in the STDS-P1619
> > > mailbox and shown under the spool
> > > >         ID 2510543 in the system log, has  been identified
> > > as a possible delivery error
> > > >         notice  for  the following  reason:  "Sender:",
> > > "From:" or  "Reply-To:"  field
> > > >         pointing to the list has been found in mail body.
> > > > 
> > > > I suspect that it's necessary to delete instances of
> > > certain strings
> > > > within the message body.  I've gone through and deleted all
> > > instances
> > > > of the string 'From:' in hopes that this won't get bounced.
> > > > 
> > > > -Matt
> > > > 
> > > > -----Original Message-----
> > > > ***** Matt Ball
> > > > Sent: Monday, March 27, 2006 9:27 AM
> > > > To: 'laszlo'; [EMAIL PROTECTED]
> > > > Subject: RE: P1619 - non-removable
> > > > 
> > > > 
> > > > Hi Lazlo,
> > > > 
> > > > I recommended the GCM mode of P1619.1 because it would also
> > > be well-
> > > > suited to a hard disk implementation.  Although the scope
> > > for P1619.1
> > > > states that it is "an architecture for protection of data in 
> > > > variable-length block storage devices", the solution is equally 
> > > > applicable to fixed-block storage devices such as disk drives.
> > > > 
> > > > The only requirement for a 1619.1-compliant disk drive 
> is that the 
> > > > drive appends a 16-byte MAC to each 'record'.  Since many
> > > disk drives
> > > > already have provisions for supporting a CRC, it would 
> not be too 
> > > > difficult to replace this with a cryptographically 
> secure Message 
> > > > Authentication Code.
> > > > 
> > > > GCM mode in particular would be an excellent solution 
> for a disk 
> > > > drive.  The hardware complexity is roughly equivalent to
> > > that of LRW
> > > > (one AES-encr block, and one 128-bit Galois multiplier).
> > > > 
> > > > Here are a couple of other useful features for GCM:
> > > > - Uses a 128-bit message authentication code (MAC)
> > > > - Uses counter (CTR) mode encryption, allowing any size for
> > > the plaintext
> > > >   and ciphertext.
> > > > - Allows Additional Authenticated Data (AAD), which is included
> > > >   in the MAC computation, but is not encrypted
> > > > - It is possible to incrementally compute the MAC because of the
> > > >   linear nature of the Galois field multiplier.  This allows for
> > > >   parallel implementations (GCM essentially uses GMAC)
> > > > - NIST is nearly ready to approve GCM mode for FIPS 140-2
> > > (or FIPS 140-3).
> > > > 
> > > > Since most new disk drives will begin support 4096-byte 
> sectors, 
> > > > it would be possible to add a 16-byte MAC to each 
> sector without 
> > > > incurring too much overhead (overhead = 0.4% for 
> 4096-byte sector).
> > > > 
> > > > The only trick with GCM mode is that it is much more
> > > important to make
> > > > sure the IV is unique across different vendors.  The
> > > P1619.1-D5 draft
> > > > current mitigates this problem by providing a standard
> > > key-transform
> > > > algorithm, or imposes requirements for an IV that is 
> derived from 
> > > > a cryptographically-secure pseudo-random number generator.
> > > > 
> > > > See the latest P1619.1-D5 draft for more details.  Let me
> > > know if you
> > > > have any other questions!
> > > > 
> > > > -Matt
> > > > 
> > > > 
> > > > -----Original Message-----
> > > > ***** [email protected] 
> > > > [mailto:[EMAIL PROTECTED] Behalf Of laszlo
> > > > Sent: Friday, March 24, 2006 7:31 PM
> > > > To: [EMAIL PROTECTED]
> > > > Subject: RE: P1619 - non-removable
> > > > 
> > > > 
> > > > Matt,
> > > > 
> > > > >> Have you considered using the GCM mode of P1619.1 for
> > > your disk drives?
> > > > 
> > > > We are not involved in the tape business, so I did not pay
> > > attention.
> > > > Could you tell in a nutshell, what are the advantages of
> > > GCM over the
> > > > simple AES counter mode?
> > > > 
> > > > >> I can't see any reason to make any more changes to P1619
> > > at this time.
> > > > 
> > > > In the last teleconference I expressed my concerns that the
> > > WG would
> > > > not take the security of non-removable storage seriously. I was 
> > > > promised that the WG would fully support it. The last two weeks 
> > > > and your comment show the opposite. I only voted for submitting
> > > the draft
> > > > for editorial review, because I believed that 
> alternatives would 
> > > > be added to it. I cannot change my cast vote, but it 
> proved to be 
> > > > a mistake. I can only repeat, what I have said several 
> times: the 
> > > > current proposal is useless for the overwhelming majority of 
> > > > secure storage applications. I thought it was a damn good reason
> > > for changing the draft.
> > > > 
> > > > Laszlo
> > > > 
> > > > > -------- Original Message --------
> > > > > Subject: RE: P1619 - non-removable
> > > > > ***** "Matt Ball"
> > > > > Date: Fri, March 24, 2006 6:42 pm
> > > > > To: laszlo, stds-p1619
> > > > >
> > > > > Hi Lazlo,
> > > > >
> > > > > Have you considered using the GCM mode of P1619.1 for
> > > your disk drives?
> > > > > I think it has most or all the features you're looking for.
> > > > >
> > > > > I skimmed through your document, and it looks like
> > > there's a lot of
> > > > > stuff in there that has already been covered by the SATA
> > > spec (like
> > > > > master passwords and such), or will likely be covered by
> > > the Trusted
> > > > > Computing Group (user authentication and access control).
> > > > > These things are beyond the scope of this working group.
> > > > >
> > > > > The other complaints are basically handled by the GCM mode.
> > > > >
> > > > > I can't see any reason to make any more changes to 
> P1619 at this 
> > > > > time.
> > > > >
> > > > > -Matt
> > > > 
> > > >   
> > > 
> > >
> 
> 

Reply via email to