Outline of the paper by the same name.


This is an outline of the topics covered in New Methods in Hard Disk Encryption at http://clemens.endorphin.org/cryptography. The main chapters of interest are 5 (Password Management) and 6 (A Tour or LUKS: Linux Unified Key Setup).

Chapters 1-4: Mathematical and Cryptographic Background Information

Chapters 1 through 4 cover mathematical and cryptographic background info. Two important ideas are found here:

The cipher and mode used for disk encryption needs to be noted with any product being evaluated.

Chapter 5: Password management

Key Hierarchies for Passwords

The actual key used to encrypt the data (master key) is stored encrypted with one or more user keys which can be used to decrypt the master key.

Anti-forensic Data Storage

A key hierarchy with an encrypted master key stored on the disk raises some concerns about exactly how that key is stored and how you can be assured that it is destroyed if it is erased.

Passwords from Entropy Weak Sources

Users do not always pick strong passwords. Even if they do, good passwords usually contain less entropy than 128-bit keys and they are easier to guess than the key they are protecting. Methods can be used to expand the size of the key domain and remedy some aspects of these problems.

TKS1: Template Key Setup 1

TKS1 is a concrete design using the ideas expressed earlier in this chapter.

Chapter 6: A Tour of LUKS: Linux Unified Key Setup

Additional Info

(Material in this section is not covered in the paper, but I thought it should be added here. PEB)

Plausible Deniability

Steganography