• IEEE 1619.1-2007

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

    Available format(s):  PDF

    Superseded date:  26-06-2019

    Language(s):  English

    Published date:  16-05-2008

    Publisher:  Institute of Electrical & Electronics Engineers

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Overview
      1.1 Scope
      1.2 Purpose
      1.3 Description of clauses and annexes
    2 Normative references
    3 Keywords, definitions, acronyms, and abbreviations
      3.1 Keywords
      3.2 Definitions
      3.3 Acronyms and abbreviations
      3.4 Mathematical conventions
    4 General concepts
      4.1 Introduction
      4.2 Components
      4.3 Plaintext record formatter
      4.4 Plaintext record de-formatter
      4.5 Encryption routine
      4.6 Decryption routine
      4.7 Cryptographic parameters
    5 Cryptographic modes
      5.1 Overview
      5.2 Counter with cipher block chaining-message authentication
          code (CCM)
      5.3 Galois/Counter Mode (GCM)
      5.4 Cipher block chaining with keyed-hash message authentication
          code (CBC-HMAC)
      5.5 Xor-encrypt-xor with tweakable block-cipher with
          keyed-hash message authentication code (XTS-HMAC)
    6 Cryptographic key management and initialization vector
      requirements
      6.1 Random bit generator
      6.2 Cryptographic key entry and export
      6.3 Handling the cipher key
      6.4 Cryptographic key wrapping on the storage medium
      6.5 Initialization vector (IV) requirements
      6.6 Creating unique IVs within a self-contained group
    Annex A (informative) Bibliography
    Annex B (informative) Security concerns
          B.1 Threat model
          B.2 Maintaining cryptographic key security
          B.3 Replay attacks
          B.4 Passing plaintext to the host before checking the MAC
          B.5 Checking for integrity of a cryptographic key
          B.6 Avoiding collisions of initialization vectors
          B.7 Examples of IV collision avoidance strategies
          B.8 How many records to encrypt with one key?
    Annex C (informative) Documentation summary
    Annex D (informative) Test vectors
          D.1 General
          D.2 CCM-128-AES-256 test vectors
          D.3 GCM-128-AES-256 test vectors
          D.4 CBC-AES-256-HMAC-SHA test vectors (including HMAC-SHA-1,
              HMAC-SHA-256, and HMAC-SHA-512)
          D.5 XTS-AES-256-HMAC-SHA-512 test vectors

    Abstract - (Show below) - (Hide below)

    Describes requirements for cryptographic units that provide encryption and authentication for data contained within storage media.

    General Product Information - (Show below) - (Hide below)

    Committee Cybersecurity and Privacy Standards Committee
    Document Type Standard
    Publisher Institute of Electrical & Electronics Engineers
    Status Superseded
    Superseded By

    Standards Referenced By This Book - (Show below) - (Hide below)

    INCITS/ISO/IEC 27040 : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
    14/30249803 DC : 0 BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
    DIN EN ISO/IEC 27040:2016-04 (Draft) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
    ANSI INCITS 501 : 2016 INFORMATION TECHNOLOGY - SECURITY FEATURES FOR SCSI COMMANDS (SFSC)
    ISO/IEC 14776-454:2018 Information technology Small computer system interface (SCSI) Part 454: SCSI Primary Commands - 4 (SPC-4)
    ANSI INCITS 513 : 2015 INFORMATION TECHNOLOGY - SCSI PRIMARY COMMANDS - 4 (SPC-4)
    DIN EN ISO/IEC 27040 E : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
    IEEE 2410-2015 IEEE Standard for Biometric Open Protocol
    BS ISO/IEC 27040 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
    BS EN ISO/IEC 27040:2016 Information technology. Security techniques. Storage security
    ISO/IEC 27040:2015 Information technology — Security techniques — Storage security
    EN ISO/IEC 27040:2016 Information technology - Security techniques - Storage security (ISO/IEC 27040:2015)
    I.S. EN ISO/IEC 27040:2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)

    Standards Referencing This Book - (Show below) - (Hide below)

    IEEE 1619-2007 IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective