Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Data Storage Encryption Security Hardware

Seagate Ships World's Most Secure Hard Drive 148

An anonymous reader writes to let us know that after two years Seagate is finally shipping its full-disk encryption product, and you can get your hands on it in a laptop from system vendor ASI.
This discussion has been archived. No new comments can be posted.

Seagate Ships World's Most Secure Hard Drive

Comments Filter:
  • by archen ( 447353 ) on Monday March 12, 2007 @11:09AM (#18316749)
    Actually it appears that it is using a CBC, there appears to be a middle layer that arbitrarily partitions sections that are encrypted and decrypted on the fly. I was pretty skeptical the last time this was mentioned on slashdot, but I have to admit this actually looks like a promising product. I'll wait for some more skillful security experts to evaluate it first, but I'm certainly keeping an open mind on it.
  • by pv2b ( 231846 ) on Monday March 12, 2007 @11:30AM (#18317019)
    There's a funamental difference here.

    Most DRM hinges on the fact that the content must stay readable, in however limited a sense. In other words, you're giving the encrypted content to the attacker, who also has to have the key in order to use it. The attacker and the intended recipient are the same person.

    When you take away that requirement, encryption actually becomes workable.
  • by BenEnglishAtHome ( 449670 ) * on Monday March 12, 2007 @11:36AM (#18317121)
    ...of the competitors in this market space. Several companies have been doing this for years with good track records. I think these links [slashdot.org] are still good.
  • by stratjakt ( 596332 ) on Monday March 12, 2007 @11:39AM (#18317179) Journal
    You don't have to use the fingerprint reader, and my understanding is that it's more of a windows-logon thing than a boot-up thing.

    However, you could easily design a keypad that makes it nigh-impossible to lift a print. A simple rough textured finish on the top would do the trick.
  • by Nutria ( 679911 ) on Monday March 12, 2007 @11:49AM (#18317309)
    What makes this the most secure?

    Because it's the only (publicly available) HDD with *cryption functions built into the circuitry.

    Is this really any more secure than dm-crypt? Faster, no doubt, but more secure?

    Probably not. But simpler for users/admins to put out in the field.

    But closed-source, so we really don't know how well it was implemented.

  • by mwilliamson ( 672411 ) on Monday March 12, 2007 @11:52AM (#18317353) Homepage Journal
    Slap one of these bad-boys into a video camera with only the ability to only write/encrypt and then you'll have a tool journalists can use without fear their content will be pilfered by a herd of unwieldly pigs. Only once the cam is back from the field would the data be accessable. This of course assumes the drive uses some sort of PKI, it may be symmetric only, in which case you'd have to add something to generate the symmetric keys from a PKI infrastructure. Performance should still be good with the added PKI module since the internal crypto would still be using the hardware accelerator with the derived symmetric keys.
  • Re:Oh Goody! (Score:3, Informative)

    by Nutria ( 679911 ) on Monday March 12, 2007 @11:58AM (#18317423)
    Next step - find out what the minimum passwords requirements are. With a password you're likely to type in every time the laptop boots, you can bet it'll be as simple as possible. For example, if it's 8 latters, must include capital and number, you can almost bet it'll be XxxxxxxN for a whooping 36 bits of security. Almost nobody bothers to type in a password to match the AES strength with any regularity...

    Don't be so sure.

    I had to install PGP Desktop and encrypt my laptop's HDD, and when it asked me for the pass phrase, there was a "strongness" meter that increased the more and more random the pass phrase. Using a combination of upper & lower-case letters plus , it wouldn't accept anything shorter than, IIRC, 18 characters.

  • by this great guy ( 922511 ) on Monday March 12, 2007 @12:34PM (#18317819)
    Most good hard disk encryption technologies behave in way that if a single bit is flipped in an encrypted sector, then the whole decrypted sector becomes corrupted (and others sectors around this one are not affected). This sort of behavior is desired and help prevent content leak attacks.

    For example, Loop-AES behaves like this in multi-key-v3 mode where CBC is used with an IV computed from a secret key, the sector number, and plaintext blocks [1..n-1] in the sector. This is also how Microsoft Bitlocker behaves because they combine CBC with the Elephant diffuser. When CBC is not used, this property can be achieved using LRW or XEX, or wide-block encryption.

  • by J'raxis ( 248192 ) on Monday March 12, 2007 @01:58PM (#18319257) Homepage

    This is how Linux's crypto-loop works. The CBC is run across only individual 512-byte blocks of the disk. I think they use the sector number as an IV.

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...