Flaws and Solutions: Disk Encryption

Contributed by Rob Hornbuckle

Providers of encryption software do not protect against side channel attacks, leaving organizations vulnerable to exploitation. For those companies who have a business justification to employ methods to virtually eliminate the weaknesses within encryption, several options are available. Of note, are methods used by Trevisor, Cryptkeeper, and TPM. Also note that to completely remove the vulnerabilities inherent with Cryptkeeper, it needs to be developed further using concepts from Trevisor. These solutions in their current form are cost prohibitive from an implementation standpoint for most companies.

This document is in PDF format. To view it click here.

Rate this article: 
Average: 2 (1 vote)