Menu
Coming soon: Full-disk encryption for all computer drives

Coming soon: Full-disk encryption for all computer drives

Drive makers settle on a single encryption standard

The three specifications include:

— The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.

— The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.

— The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.

Several of the drive manufacturers, including Seagate, Fujitsu and Hitachi, already support the specification on some of their drives. Hitachi, for instance, is shipping its internal TravelStar 500 laptop drives with full-disk encryption.

Several encryption management software vendors, including Wave Systems, WinMagic, and CryptoMill Technologies, have also announced product certification for the specification.

Brian Berger, a marketing manager with Wave Systems and chair of the TCG marketing work group, said the specifications call for the use of Advanced Encryption Standard (AES). Vendors are free to choose to AES 128-bit or AES 256-bit keys depending on the level of security they want. Neither have been broken.

"Things like key manageability and patch management become things of the past," he said. "You don't have to worry about what version of encryption software is running or what [encryption appliance] your system's plugged into. When encrypted drives are under management, users can't turn off encryption, so there's no chance of users losing machines with valuable data on them after having turned off encryption."

The effort to create the encryption specifications, which began six years ago, focused on full-disk encryption, which protects data on a computer by encrypting all of the information on the computer's hard drive regardless of what partition it's on. In order to gain access to the information, users would first have to supply a password, which, in turn, would be used to unlock a key used to decrypt the data.

"You can use these [enabled] drives to childproof your laptop because it operates outside of Windows. Windows hasn't even booted yet. Your kid can't crack it unless [he] has password. You can leave laptop at home and rest assured a 14-year-old can't get on it," Thibadeau said.

IT departments will also be able to repurpose drives using the encryption standard by cryptographically erasing them with a few keystrokes. Cryptographic erasure changes the cryptographic key, thus making data permanently inaccessible.

"The specific way in which encryption is done inside the drive doesn't matter for interoperability," said Jorge Campello. senior manager of architecture and electronics at Hitachi. "What matters is how they drives are configured and how access control is configured. So any drive put, in conforming to these standards, will have the same interface commands."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Events

Show Comments