• Shopping Cart
    There are no items in your cart

IEEE 1619.1-2007

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

Available format(s)

PDF

Superseded date

26-06-2019

Superseded by

IEEE 1619.1-2018

Language(s)

English

Published date

16-05-2008

€136.64
Excluding VAT

1 Overview
  1.1 Scope
  1.2 Purpose
  1.3 Description of clauses and annexes
2 Normative references
3 Keywords, definitions, acronyms, and abbreviations
  3.1 Keywords
  3.2 Definitions
  3.3 Acronyms and abbreviations
  3.4 Mathematical conventions
4 General concepts
  4.1 Introduction
  4.2 Components
  4.3 Plaintext record formatter
  4.4 Plaintext record de-formatter
  4.5 Encryption routine
  4.6 Decryption routine
  4.7 Cryptographic parameters
5 Cryptographic modes
  5.1 Overview
  5.2 Counter with cipher block chaining-message authentication
      code (CCM)
  5.3 Galois/Counter Mode (GCM)
  5.4 Cipher block chaining with keyed-hash message authentication
      code (CBC-HMAC)
  5.5 Xor-encrypt-xor with tweakable block-cipher with
      keyed-hash message authentication code (XTS-HMAC)
6 Cryptographic key management and initialization vector
  requirements
  6.1 Random bit generator
  6.2 Cryptographic key entry and export
  6.3 Handling the cipher key
  6.4 Cryptographic key wrapping on the storage medium
  6.5 Initialization vector (IV) requirements
  6.6 Creating unique IVs within a self-contained group
Annex A (informative) Bibliography
Annex B (informative) Security concerns
      B.1 Threat model
      B.2 Maintaining cryptographic key security
      B.3 Replay attacks
      B.4 Passing plaintext to the host before checking the MAC
      B.5 Checking for integrity of a cryptographic key
      B.6 Avoiding collisions of initialization vectors
      B.7 Examples of IV collision avoidance strategies
      B.8 How many records to encrypt with one key?
Annex C (informative) Documentation summary
Annex D (informative) Test vectors
      D.1 General
      D.2 CCM-128-AES-256 test vectors
      D.3 GCM-128-AES-256 test vectors
      D.4 CBC-AES-256-HMAC-SHA test vectors (including HMAC-SHA-1,
          HMAC-SHA-256, and HMAC-SHA-512)
      D.5 XTS-AES-256-HMAC-SHA-512 test vectors

Describes requirements for cryptographic units that provide encryption and authentication for data contained within storage media.

Committee
Cybersecurity and Privacy Standards Committee
DocumentType
Standard
Pages
53
PublisherName
Institute of Electrical & Electronics Engineers
Status
Superseded
SupersededBy

INCITS/ISO/IEC 27040 : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
14/30249803 DC : 0 BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
DIN EN ISO/IEC 27040:2016-04 (Draft) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
ANSI INCITS 501 : 2016 INFORMATION TECHNOLOGY - SECURITY FEATURES FOR SCSI COMMANDS (SFSC)
ISO/IEC 14776-454:2018 Information technology Small computer system interface (SCSI) Part 454: SCSI Primary Commands - 4 (SPC-4)
ANSI INCITS 513 : 2015 INFORMATION TECHNOLOGY - SCSI PRIMARY COMMANDS - 4 (SPC-4)
IEEE 2410-2015 IEEE Standard for Biometric Open Protocol
BS ISO/IEC 27040 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
BS EN ISO/IEC 27040:2016 Information technology. Security techniques. Storage security
ISO/IEC 27040:2015 Information technology — Security techniques — Storage security
EN ISO/IEC 27040:2016 Information technology - Security techniques - Storage security (ISO/IEC 27040:2015)
I.S. EN ISO/IEC 27040:2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)

IEEE 1619-2007 IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.