Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Decryption Process

When a user requests a file that is encrypted, EFS locates the name of the encrypter in the DDF within the $Logged_Utility_Stream and uses that as a hint for finding the private key to decrypt the FEK. EFS uses a user's private key to decrypt the FEK, using the corresponding encrypted FEK item in the DDF. As shown in Figure 21.3, the FEK is used to decrypt the file data on a block-by-block basis.

Figure 21.3. EFS decryption flow chart.

Random access to a large file decrypts only the specific blocks read from a disk for the file; EFS does not need to decrypt the entire file. EFS encrypts and decrypts by reading in 512-byte ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book