{"id":81692,"date":"2024-10-17T18:57:21","date_gmt":"2024-10-17T18:57:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1619-1-2008\/"},"modified":"2024-10-24T19:47:38","modified_gmt":"2024-10-24T19:47:38","slug":"ieee-1619-1-2008","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1619-1-2008\/","title":{"rendered":"IEEE 1619.1 2008"},"content":{"rendered":"
New IEEE Standard – Active. This standard specifies cryptographic and data authentication procedures for storage devices that support length-expansion, such as tape drives. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | IEEE Std 1619.1-2007 <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction Notice to users Laws and regulations Copyrights Updating of IEEE documents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Errata Interpretations Patents Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Important notice 1. Overview 1.1 Scope 1.2 Purpose 1.3 Description of clauses and annexes <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 2. Normative references 3. Keywords, definitions, acronyms, and abbreviations 3.1 Keywords <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3.2 Definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3.3 Acronyms and abbreviations 3.4 Mathematical conventions 4. General concepts 4.1 Introduction <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.2 Components 4.2.1 Controller <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.2.2 Host 4.2.3 Key manager 4.2.4 Cryptographic unit <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.2.5 Storage medium 4.3 Plaintext record formatter 4.4 Plaintext record de-formatter <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.5 Encryption routine 4.5.1 Overview 4.5.2 Inputs 4.5.3 Outputs 4.6 Decryption routine 4.6.1 Overview <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.6.2 Decryption inputs 4.6.3 Ordering verification <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.6.4 Verification-only mode 4.7 Cryptographic parameters 5. Cryptographic modes 5.1 Overview <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.2 Counter with cipher block chaining-message authentication code (CCM) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.3 Galois\/Counter Mode (GCM) 5.4 Cipher block chaining with keyed-hash message authentication code (CBC-HMAC) <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.5 Xor-encrypt-xor with tweakable block-cipher with keyed-hash message authentication code (XTS-HMAC) <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6. Cryptographic key management and initialization vector requirements 6.1 Random bit generator <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.2 Cryptographic key entry and export 6.3 Handling the cipher key 6.4 Cryptographic key wrapping on the storage medium <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.5 Initialization vector (IV) requirements 6.5.1 Overview 6.5.2 Using random IVs 6.5.3 Encryption sessions <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.6 Creating unique IVs within a self-contained group <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex A (informative)Bibliography <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex B (informative)Security concerns B.1 Threat model B.2 Maintaining cryptographic key security <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | B.3 Replay attacks B.4 Passing plaintext to the host before checking the MAC <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | B.5 Checking for integrity of a cryptographic key B.6 Avoiding collisions of initialization vectors B.7 Examples of IV collision avoidance strategies B.7.1 Example 1: Using random IVs <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | B.7.2 Example 2: Incrementing a random IV <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | B.7.3 Example 3: Randomizing only the key B.8 How many records to encrypt with one key? <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex C (informative)Documentation summary <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Annex D (informative)Test vectors D.1 General <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | D.2 CCM-128-AES-256 test vectors D.2.1 CCM-128-AES-256 test vector 1 D.2.2 CCM-128-AES-256 test vector 2 D.2.3 CCM-128-AES-256 test vector 3 D.2.4 CCM-128-AES-256 test vector 4 D.2.5 CCM-128-AES-256 test vector 5 D.2.6 CCM-128-AES-256 test vector 6 <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | D.2.7 CCM-128-AES-256 test vector 7 D.2.8 CCM-128-AES-256 test vector 8 D.2.9 CCM-128-AES-256 test vector 9 D.3 GCM-128-AES-256 test vectors D.3.1 GCM-128-AES-256 test vector 1 <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | D.3.2 GCM-128-AES-256 test vector 2 D.3.3 GCM-128-AES-256 test vector 3 D.3.4 GCM-128-AES-256 test vector 4 D.3.5 GCM-128-AES-256 test vector 5 D.3.6 GCM-128-AES-256 test vector 6 <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | D.3.7 GCM-128-AES-256 test vector 7 D.3.8 GCM-128-AES-256 test vector 8 D.3.9 GCM-128-AES-256 test vector 9 D.3.10 GCM-128-AES-256 test vector 10 D.3.11 GCM-128-AES-256 test vector 11 <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | D.3.12 GCM-128-AES-256 test vector 12 D.4 CBC-AES-256-HMAC-SHA test vectors (including HMAC-SHA-1, HMAC-SHA-256, and HMAC-SHA-512) D.4.1 CBC-AES-256-HMAC-SHA test vector 1 D.4.2 CBC-AES-256-HMAC-SHA test vector 2 D.4.3 CBC-AES-256-HMAC-SHA test vector 3 <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | D.4.4 CBC-AES-256-HMAC-SHA test vector 4 D.4.5 CBC-AES-256-HMAC-SHA test vector 5 D.4.6 CBC-AES-256-HMAC-SHA test vector 6 <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | D.4.7 CBC-AES-256-HMAC-SHA test vector 7 D.4.8 CBC-AES-256-HMAC-SHA test vector 8 <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | D.4.9 CBC-AES-256-HMAC-SHA test vector 9 D.5 XTS-AES-256-HMAC-SHA-512 test vectors D.5.1 XTS-AES-256-HMAC-SHA-512 test vector 1 <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | D.5.2 XTS-AES-256-HMAC-SHA-512 test vector 2 <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | D.5.3 XTS-AES-256-HMAC-SHA-512 test vector 3 D.5.4 XTS-AES-256-HMAC-SHA-512 test vector 4 <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | D.5.5 XTS-AES-256-HMAC-SHA-512 test vector 5 <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices<\/b><\/p>\n |