ENCRYPTING VOLUMES

CHAPTER

9

ABOUT THIS CHAPTER

In this chapter, we look at the problem of protecting an entire storage device, as opposed to protecting individual files. We look at the following:

  Risks and policy alternatives for protecting drive contents

  Block ciphers that achieve high security

  Block cipher encryption modes

  Hardware for volume encryption

  Software for volume encryption

9.1     Securing a Volume

When we examined file systems in Section 5.1, Eve had asked to borrow a USB drive from which all data had been deleted. Eve could have tried to recover private bookkeeping files from the drive. We can avoid such risks and protect everything on the drive, including the boot blocks, directory entries, and free space, ...

Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.