Shopping Cart

No products in the cart.

IEEE 1619.1-2018

$47.67

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

Published By Publication Date Number of Pages
IEEE 2018 55
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Revision Standard – Active. Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 1619.1™-2018 Front cover
2 Title page
4 Important Notices and Disclaimers Concerning IEEE Standards Documents
7 Participants
8 Introduction
9 Contents
10 1. Overview
1.1 Scope
1.2 Purpose
1.3 Description of clauses and annexes
11 2. Normative references
3. Definitions, acronyms, abbreviations, etc.
3.1 Definitions
14 3.2 Acronyms and abbreviations
15 3.3 Mathematical conventions
4. General concepts
4.1 Introduction
16 4.2 Components
18 4.3 Plaintext record formatter
4.4 Plaintext record de-formatter
19 4.5 Encryption routine
20 4.6 Decryption routine
21 4.7 Cryptographic parameters
22 5. Cryptographic modes
5.1 Overview
23 5.2 Counter with cipher block chaining-message authentication code (CCM)
5.3 Galois/Counter Mode (GCM)
24 5.4 Cipher block chaining with keyed-hash message authentication code (CBC-HMAC)
26 5.5 Xor-encrypt-xor with tweakable block-cipher with keyed-hash message authentication code (XTS-HMAC)
27 6. Cryptographic key management and initialization vector requirements
6.1 Random bit generator
28 6.2 Cryptographic key entry and export
6.3 Handling the cipher key
6.4 Cryptographic key wrapping on the storage medium
29 6.5 Initialization vector (IV) requirements
30 6.6 Creating unique IVs within a self-contained group
32 Annex A (informative) Bibliography
34 Annex B (informative) Security concerns
B.1 Threat model
B.2 Maintaining cryptographic key security
35 B.3 Replay attacks
B.4 Passing plaintext to the host before checking the MAC
36 B.5 Checking for integrity of a cryptographic key
B.6 Avoiding collisions of initialization vectors
37 B.7 Examples of IV collision avoidance strategies
38 B.8 How many records to encrypt with one key?
40 Annex C (informative) Documentation summary
41 Annex D (informative) Test vectors
D.1 General
42 D.2 CCM-128-AES-256 test vectors
44 D.3 GCM-128-AES-256 test vectors
46 D.4 CBC-AES-256-HMAC-SHA test vectors (including HMAC-SHA-1, HMAC-SHA-256, and HMAC-SHA-512)
50 D.5 XTS-AES-256-HMAC-SHA-512 test vectors
55 Back cover
IEEE 1619.1-2018
$47.67