{"id":81692,"date":"2024-10-17T18:57:21","date_gmt":"2024-10-17T18:57:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1619-1-2008\/"},"modified":"2024-10-24T19:47:38","modified_gmt":"2024-10-24T19:47:38","slug":"ieee-1619-1-2008","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1619-1-2008\/","title":{"rendered":"IEEE 1619.1 2008"},"content":{"rendered":"

New IEEE Standard – Active. This standard specifies cryptographic and data authentication procedures for storage devices that support length-expansion, such as tape drives. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices <\/td>\n<\/tr>\n
3<\/td>\nIEEE Std 1619.1-2007 <\/td>\n<\/tr>\n
6<\/td>\nIntroduction
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents <\/td>\n<\/tr>\n
7<\/td>\nErrata
Interpretations
Patents
Participants <\/td>\n<\/tr>\n
10<\/td>\nCONTENTS <\/td>\n<\/tr>\n
13<\/td>\nImportant notice
1. Overview
1.1 Scope
1.2 Purpose
1.3 Description of clauses and annexes <\/td>\n<\/tr>\n
14<\/td>\n2. Normative references
3. Keywords, definitions, acronyms, and abbreviations
3.1 Keywords <\/td>\n<\/tr>\n
15<\/td>\n3.2 Definitions <\/td>\n<\/tr>\n
18<\/td>\n3.3 Acronyms and abbreviations
3.4 Mathematical conventions
4. General concepts
4.1 Introduction <\/td>\n<\/tr>\n
20<\/td>\n4.2 Components
4.2.1 Controller <\/td>\n<\/tr>\n
21<\/td>\n4.2.2 Host
4.2.3 Key manager
4.2.4 Cryptographic unit <\/td>\n<\/tr>\n
22<\/td>\n4.2.5 Storage medium
4.3 Plaintext record formatter
4.4 Plaintext record de-formatter <\/td>\n<\/tr>\n
23<\/td>\n4.5 Encryption routine
4.5.1 Overview
4.5.2 Inputs
4.5.3 Outputs
4.6 Decryption routine
4.6.1 Overview <\/td>\n<\/tr>\n
24<\/td>\n4.6.2 Decryption inputs
4.6.3 Ordering verification <\/td>\n<\/tr>\n
25<\/td>\n4.6.4 Verification-only mode
4.7 Cryptographic parameters
5. Cryptographic modes
5.1 Overview <\/td>\n<\/tr>\n
26<\/td>\n5.2 Counter with cipher block chaining-message authentication code (CCM) <\/td>\n<\/tr>\n
27<\/td>\n5.3 Galois\/Counter Mode (GCM)
5.4 Cipher block chaining with keyed-hash message authentication code (CBC-HMAC) <\/td>\n<\/tr>\n
29<\/td>\n5.5 Xor-encrypt-xor with tweakable block-cipher with keyed-hash message authentication code (XTS-HMAC) <\/td>\n<\/tr>\n
31<\/td>\n6. Cryptographic key management and initialization vector requirements
6.1 Random bit generator <\/td>\n<\/tr>\n
32<\/td>\n6.2 Cryptographic key entry and export
6.3 Handling the cipher key
6.4 Cryptographic key wrapping on the storage medium <\/td>\n<\/tr>\n
33<\/td>\n6.5 Initialization vector (IV) requirements
6.5.1 Overview
6.5.2 Using random IVs
6.5.3 Encryption sessions <\/td>\n<\/tr>\n
34<\/td>\n6.6 Creating unique IVs within a self-contained group <\/td>\n<\/tr>\n
36<\/td>\nAnnex A (informative)Bibliography <\/td>\n<\/tr>\n
38<\/td>\nAnnex B (informative)Security concerns
B.1 Threat model
B.2 Maintaining cryptographic key security <\/td>\n<\/tr>\n
39<\/td>\nB.3 Replay attacks
B.4 Passing plaintext to the host before checking the MAC <\/td>\n<\/tr>\n
40<\/td>\nB.5 Checking for integrity of a cryptographic key
B.6 Avoiding collisions of initialization vectors
B.7 Examples of IV collision avoidance strategies
B.7.1 Example 1: Using random IVs <\/td>\n<\/tr>\n
41<\/td>\nB.7.2 Example 2: Incrementing a random IV <\/td>\n<\/tr>\n
42<\/td>\nB.7.3 Example 3: Randomizing only the key
B.8 How many records to encrypt with one key? <\/td>\n<\/tr>\n
44<\/td>\nAnnex C (informative)Documentation summary <\/td>\n<\/tr>\n
45<\/td>\nAnnex D (informative)Test vectors
D.1 General <\/td>\n<\/tr>\n
46<\/td>\nD.2 CCM-128-AES-256 test vectors
D.2.1 CCM-128-AES-256 test vector 1
D.2.2 CCM-128-AES-256 test vector 2
D.2.3 CCM-128-AES-256 test vector 3
D.2.4 CCM-128-AES-256 test vector 4
D.2.5 CCM-128-AES-256 test vector 5
D.2.6 CCM-128-AES-256 test vector 6 <\/td>\n<\/tr>\n
47<\/td>\nD.2.7 CCM-128-AES-256 test vector 7
D.2.8 CCM-128-AES-256 test vector 8
D.2.9 CCM-128-AES-256 test vector 9
D.3 GCM-128-AES-256 test vectors
D.3.1 GCM-128-AES-256 test vector 1 <\/td>\n<\/tr>\n
48<\/td>\nD.3.2 GCM-128-AES-256 test vector 2
D.3.3 GCM-128-AES-256 test vector 3
D.3.4 GCM-128-AES-256 test vector 4
D.3.5 GCM-128-AES-256 test vector 5
D.3.6 GCM-128-AES-256 test vector 6 <\/td>\n<\/tr>\n
49<\/td>\nD.3.7 GCM-128-AES-256 test vector 7
D.3.8 GCM-128-AES-256 test vector 8
D.3.9 GCM-128-AES-256 test vector 9
D.3.10 GCM-128-AES-256 test vector 10
D.3.11 GCM-128-AES-256 test vector 11 <\/td>\n<\/tr>\n
50<\/td>\nD.3.12 GCM-128-AES-256 test vector 12
D.4 CBC-AES-256-HMAC-SHA test vectors (including HMAC-SHA-1, HMAC-SHA-256, and HMAC-SHA-512)
D.4.1 CBC-AES-256-HMAC-SHA test vector 1
D.4.2 CBC-AES-256-HMAC-SHA test vector 2
D.4.3 CBC-AES-256-HMAC-SHA test vector 3 <\/td>\n<\/tr>\n
51<\/td>\nD.4.4 CBC-AES-256-HMAC-SHA test vector 4
D.4.5 CBC-AES-256-HMAC-SHA test vector 5
D.4.6 CBC-AES-256-HMAC-SHA test vector 6 <\/td>\n<\/tr>\n
52<\/td>\nD.4.7 CBC-AES-256-HMAC-SHA test vector 7
D.4.8 CBC-AES-256-HMAC-SHA test vector 8 <\/td>\n<\/tr>\n
53<\/td>\nD.4.9 CBC-AES-256-HMAC-SHA test vector 9
D.5 XTS-AES-256-HMAC-SHA-512 test vectors
D.5.1 XTS-AES-256-HMAC-SHA-512 test vector 1 <\/td>\n<\/tr>\n
54<\/td>\nD.5.2 XTS-AES-256-HMAC-SHA-512 test vector 2 <\/td>\n<\/tr>\n
55<\/td>\nD.5.3 XTS-AES-256-HMAC-SHA-512 test vector 3
D.5.4 XTS-AES-256-HMAC-SHA-512 test vector 4 <\/td>\n<\/tr>\n
56<\/td>\nD.5.5 XTS-AES-256-HMAC-SHA-512 test vector 5 <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2008<\/td>\n57<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":81693,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-81692","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/81692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/81693"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=81692"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=81692"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=81692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}