Linux for the Information Smuggler

نویسنده

  • Markku-Juhani O. Saarinen
چکیده

The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encryption key. We take a look into the practical problems of securely booting, authenticating, and keying full-disk encryption. We propose simple improvements to the current implementation. These are based on the notions of tweakable encryption algorithms and enciphering modes which have been proposed during last few years in cryptographic literature. We also explore the possibilities for sector-level disk authentication. The new methods have been implemented as a set of patches to the Linux Kernel series 2.6 and the relevant system tools.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Smuggling Game with the Secrecy of Smuggler’s Information

This paper deals with a smuggling game with multiple stages, in which Customs and a smuggler participate. Customs and the smuggler are allowed to take an action of patrol and smuggling, respectively, within the limited number of chances. Customs obtains reward by the capture of the smuggler and the smuggler gets reward by the success of smuggling. The reward or the payoff of the game is brought...

متن کامل

An Inspection Game with Smuggler’s Decision on the Amount of Contraband

This paper deals with an inspection game of Customs and a smuggler. Customs has two options: patrol or no-patrol. The smuggler makes a decision on the amount of contraband to smuggle. In a given period of days, Customs has a limited number of opportunities to patrol while the smuggler can ship any amount of contraband as long as he has not exhausted this supply. When both players take action, t...

متن کامل

Models for nuclear smuggling interdiction

We describe two stochastic network interdiction models for thwarting nuclear smuggling. In the first model, the smuggler travels through a transportation network on a path that maximizes the probability of evading detection, and the interdictor installs radiation sensors to minimize that evasion probability. The problem is stochastic because the smuggler’s origin-destination pair is known only ...

متن کامل

On the Inspection Game

The Inspection Game is a multistage game between a customs inspector and a smuggler, first studied by Melvin Dresher and Michael Maschler in the 1960’s. An extension allowing the smuggler to act more than once, treated by Sakaguchi in a special case, is solved. Also, a more natural version of Sakaguchi’s problem is solved in the special case where the smuggler may act at each stage.

متن کامل

A smuggling game with asymmetrical information of players

This paper deals with a smuggling game with multiple stages. Customs is allowed to patrol within the limited number of chances and obtain reward by the capture of a smuggler. The smuggler gets a reward depending on the amount of contraband he succeeds to ship in smuggling at each stage. The pay-off of the game is zero-sum. In almost all past studies, they adopt the alternative of smuggling or n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004