Proceedings of the 2012 International Conference on Computer Application and System Modeling (ICCASM 2012)

A Novel Protection Mechanism for Encryption System

Authors
Nan Lin
Corresponding Author
Nan Lin
Available Online August 2012.
DOI
10.2991/iccasm.2012.328How to use a DOI?
Keywords
Encryption systems, Memory attacks, two tiers of keys, Master Key
Abstract

Software drive encryption system is difficult to prevent memory attacks, in which, an attacker acquire the physical accesses to the unattended computer, obtains the decryption keys from memory and consequently decrypts the drive. We propose a new method for protecting encryption systems against memory attacks, by converting them to use two tiers of keys, a single Master Key and a set of File or Sector keys. When the computer is unattended, the Master Key and part of the second-tier keys are erased from memory. The method is secure against any type of memory attack, including attackers who gain complete control of the unattended system. Compared to previous methods of protection, which erase keys and shut down the computer, our method allows to keep the computer operational by a combination of cryptographic and operating systems techniques.

Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2012 International Conference on Computer Application and System Modeling (ICCASM 2012)
Series
Advances in Intelligent Systems Research
Publication Date
August 2012
ISBN
978-94-91216-00-8
ISSN
1951-6851
DOI
10.2991/iccasm.2012.328How to use a DOI?
Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Nan Lin
PY  - 2012/08
DA  - 2012/08
TI  - A Novel Protection Mechanism for Encryption System
BT  - Proceedings of the 2012 International Conference on Computer Application and System Modeling (ICCASM 2012)
PB  - Atlantis Press
SP  - 1286
EP  - 1288
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccasm.2012.328
DO  - 10.2991/iccasm.2012.328
ID  - Lin2012/08
ER  -