LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > Programming
User Name
Password
Programming This forum is for all programming questions.
The question does not have to be directly related to Linux and any language is fair game.

Notices


Reply
  Search this Thread
Old 12-15-2017, 12:53 AM   #1
rblampain
Senior Member
 
Registered: Aug 2004
Location: Western Australia
Distribution: Debian 11
Posts: 1,288

Rep: Reputation: 52
How does ignored self encryption work on self encrypting drive?


Just learning the subject. It appears self encryption drive (SED) are very common and purchased and used by customers who are unaware that the drive self-encrypts regardless of whether or not the user wants self-encryption.
As I understand, powering on and off determines the default key for encryption which becomes dependent of an (ATA) password if the user decides to master/use the encryption but I have not been able to find and understand how files can still be available to the user without the use of this ATA password within regular power-off/power-on when, as I understand, the key can be regenerated.

This seems to me to be important enough to understand if I want to take advantage of SED SSD.

Can someone point to info explaining this particular point?

Thank you for your help.
 
Old 12-15-2017, 08:13 AM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
If you do not set a so-called "Key Encryption Key (KEK)," the drive will not appear to be encrypted, even though it actually is. There is a "Media Encryption Key (MEK)" which is used to drive the actual encryption hardware on the drive, and this key is always applied.

A drive can therefore be rendered useless by deleting the MEK, which is much faster (and, more secure) than "data-wiping."

Unfortunately, there are "flies in the ointment." If you remove (steal) a drive that has been in-service, without allowing it to power-down, it might remain unlocked. (For example.) But these are mostly edge-cases which presume a determined opponent. (The situations that you're most likely to encounter, unless the Law has become very-interested in you for some reason, are merely opportunists.)

The very clear advantage of this technology is that it is built-in to the drive hardware, not performed by software. Thus it does not slow down the drive. If you do employ an unlock-password, you really do get good protection without a performance hit. And that can be a very important thing for road-warriors, for hospitals who must comply with HIPAA regulations, and so on. Any "software based" solution is much, much more cumbersome and fragile.

In a similar vein, many disk controllers provide this capability, as well, giving hardware-level performance to an array of storage devices without pushing the task to the devices themselves: very handy if you've got a lot of them.

Last edited by sundialsvcs; 12-15-2017 at 08:20 AM.
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Encrypting the usb flash drive vijaush Linux - Kernel 9 12-16-2011 04:32 AM
Encrypting your hard drive baldurpet Linux - Newbie 18 04-01-2009 02:50 AM
encrypting hard drive Murdock1979 Linux - Security 2 08-18-2006 06:56 AM
Encrypting Backups with Software Encryption nkirby Linux - Software 3 02-09-2006 12:30 PM
encrypting the hard drive ? memo007 Linux - Security 4 06-06-2005 05:11 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > Programming

All times are GMT -5. The time now is 08:58 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration