<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Shellya&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Shellya&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Shellya"/>
		<updated>2026-04-06T05:01:49Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:Shellya</id>
		<title>User:Shellya</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:Shellya"/>
				<updated>2009-04-11T01:01:27Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;New page: Coolest guy in the world, bar none.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Coolest guy in the world, bar none.&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:55:36Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;final edit i hope so&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
:''Main article: [http://en.wikipedia.org/wiki/Encryption Encryption]''&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://en.wikipedia.org/wiki/TrueCrypt TrueCrypt] and [http://en.wikipedia.org/wiki/FreeOTFE FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison of Implementations ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
* A combination of both implementations can be used to preserve plausible deniability on a device that encrypts the data itself. Since the hardware encrypts all data written to it, there is no way to deny that there is encrypted data on the drive. The software can be used to implement the security techniques discussed above to preserve plausible deniability.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given. This weakens the case for plausible deniability of encrypted data.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Corporate Security and IT Policies]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Information security awareness|Information Security Awareness]]&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 20:55, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:47:44Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Software Implementation */ changed the truecrypt and freeotfe links to point to wikipedia. i have the official sites in the external links section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
:''Main article: [http://en.wikipedia.org/wiki/Encryption Encryption]''&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://en.wikipedia.org/wiki/TrueCrypt TrueCrypt] and [http://en.wikipedia.org/wiki/FreeOTFE FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison of Implementations ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
* A combination of both implementations can be used to preserve plausible deniability on a device that encrypts the data itself. Since the hardware encrypts all data written to it, there is no way to deny that there is encrypted data on the drive. The software can be used to implement the security techniques discussed above to preserve plausible deniability.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given. This weakens the case for plausible deniability of encrypted data.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Corporate Security and IT Policies]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Information security awareness|Information Security Awareness]]&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:45:56Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Comparison */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
:''Main article: [http://en.wikipedia.org/wiki/Encryption Encryption]''&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison of Implementations ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
* A combination of both implementations can be used to preserve plausible deniability on a device that encrypts the data itself. Since the hardware encrypts all data written to it, there is no way to deny that there is encrypted data on the drive. The software can be used to implement the security techniques discussed above to preserve plausible deniability.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given. This weakens the case for plausible deniability of encrypted data.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Corporate Security and IT Policies]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Information security awareness|Information Security Awareness]]&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:41:54Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Data Encryption */  added a main article link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
:''Main article: [http://en.wikipedia.org/wiki/Encryption Encryption]''&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
* A combination of both implementations can be used to preserve plausible deniability on a device that encrypts the data itself. Since the hardware encrypts all data written to it, there is no way to deny that there is encrypted data on the drive. The software can be used to implement the security techniques discussed above to preserve plausible deniability.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given. This weakens the case for plausible deniability of encrypted data.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Corporate Security and IT Policies]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Information security awareness|Information Security Awareness]]&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:36:25Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* See Also */ added some more links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
* A combination of both implementations can be used to preserve plausible deniability on a device that encrypts the data itself. Since the hardware encrypts all data written to it, there is no way to deny that there is encrypted data on the drive. The software can be used to implement the security techniques discussed above to preserve plausible deniability.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given. This weakens the case for plausible deniability of encrypted data.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Corporate Security and IT Policies]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Information security awareness|Information Security Awareness]]&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:33:04Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Disadvantages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
* A combination of both implementations can be used to preserve plausible deniability on a device that encrypts the data itself. Since the hardware encrypts all data written to it, there is no way to deny that there is encrypted data on the drive. The software can be used to implement the security techniques discussed above to preserve plausible deniability.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given. This weakens the case for plausible deniability of encrypted data.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:32:25Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Advantages */  added another one&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
* A combination of both implementations can be used to preserve plausible deniability on a device that encrypts the data itself. Since the hardware encrypts all data written to it, there is no way to deny that there is encrypted data on the drive. The software can be used to implement the security techniques discussed above to preserve plausible deniability.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:29:12Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Disadvantages */  added another disadvantage&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
* Hardware implementations encrypt the entire disk, no option is given.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:25:41Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;now am i finished?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:22:13Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data.]]&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:hdd_external_input.jpg|frame|A hard disk drive that requires the user to unlock the encryption key before use.]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Hdd_external_input.jpg</id>
		<title>File:Hdd external input.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Hdd_external_input.jpg"/>
				<updated>2009-04-11T00:17:51Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-11T00:08:52Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;finished?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive. The key can be physically inputted to the housing in the case of a portable storage device (if such input is allowed), or simply entered when the volume is mounted.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in the MAC OS and Windows Vista operating systems&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE ('''Free''' '''O'''n '''T'''he '''F'''ly '''E'''ncryption)] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software to keep data secure.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
== Comparison ==&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Having the encryption technology on the actual device removes the requirement of having the CPU perform the calculations for the encryption process.&lt;br /&gt;
* The software implementation allows for flexibility in the way volumes, entire disks, or single files may be encrypted.&lt;br /&gt;
* By having the encryption technology as part of the housing for a portable storage device, the actual physical hard drive within is a regular hard drive and can be switched for other compatible hard drives.&lt;br /&gt;
* Some implementations completely wipe all encrypted data after a certain number of failed attempts to unlock the information. This is useful when dealing with highly sensitive data.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of storage devices that encrypt data themselves is higher than storage devices that do not. This may be an issue for home/casual use.&lt;br /&gt;
* Proper benchmarking has not been performed yet on hard drives that take care of the encryption process&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
* If the user loses their key to the data, the data is lost.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T23:50:24Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Identifying Marks */ added in words.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in MAC OSX and Windows Vista&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
&lt;br /&gt;
===== Identifying Features =====&lt;br /&gt;
Another feature that helps to ensure plausible deniability is the software technique of not leaving any signature or header that could lead to the existence of encrypted data being discovered. Data is encrypted in such a way to make it impossible to to tell from random data. This is done so that without knowing the key, encrypted data cannot be detected, and neither can hidden volumes.&lt;br /&gt;
&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Removes the requirement of having the CPU perform the calculations for the encryption process by performing the encryption itself.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of these storage devices is significantly higher than storage devices that do not perform encryption.&lt;br /&gt;
* Proper benchmarking has not been performed yet&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T23:44:45Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Hidden Volumes */  added a single sentence&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in MAC OSX and Windows Vista&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
This is a feature that adds to the security of plausible deniability. A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
&lt;br /&gt;
===== Identifying Marks =====&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Removes the requirement of having the CPU perform the calculations for the encryption process by performing the encryption itself.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of these storage devices is significantly higher than storage devices that do not perform encryption.&lt;br /&gt;
* Proper benchmarking has not been performed yet&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T23:40:24Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;/* Data Encryption */ edit of some english.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data is encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in MAC OSX and Windows Vista&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Marks =====&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Removes the requirement of having the CPU perform the calculations for the encryption process by performing the encryption itself.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of these storage devices is significantly higher than storage devices that do not perform encryption.&lt;br /&gt;
* Proper benchmarking has not been performed yet&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T23:39:35Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data was encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or through the use of software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The standards were established by the [https://www.trustedcomputinggroup.org/groups/storage Trusted Computing Group (TCG)] and are outlined as follows&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;:&lt;br /&gt;
* The Opal specification, which outlines minimum requirements for storage devices used in PCs and laptops.&lt;br /&gt;
* The Enterprise Security Subsystem Class Specification, which is aimed at drives in data centers and high-volume applications, where typically there is a minimum security configuration at installation.&lt;br /&gt;
* The Storage Interface Interactions Specification, which specifies how the TCG's existing Storage Core Specification and the other specifications interact with other standards for storage interfaces and connections. For example, the specification supports a number of transports, including ATA parallel and serial, SCSI SAS, Fibre Channel and ATAPI.&lt;br /&gt;
The location of the technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software implementations are applications which allow a user to encrypt a portion or all of a storage device. Even single files can be individually encrypted. Some implementations provide techniques to prevent the data from being found. Software encryption is offered natively in MAC OSX and Windows Vista&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;. Additionally, free implementations are available, [http://www.truecrypt.org TrueCrypt] and [http://www.freeotfe.org FreeOTFE] are two examples of this.&lt;br /&gt;
==== Security Techniques ====&lt;br /&gt;
Some or all of the following techniques may be employed by encryption software.&lt;br /&gt;
===== Plausible Deniability =====&lt;br /&gt;
The purpose of encrypting data is to keep it secure. The software may encrypt the data in such a way that the existence of the encrypted data is unprovable. [http://en.wikipedia.org/wiki/Plausible_deniability#Use_in_cryptography Plausible deniability] may even be extended to further levels for added security.&lt;br /&gt;
===== Hidden Volumes =====&lt;br /&gt;
A hidden volume is a [[Steganography and Digital Watermarking|steganographic]] feature that allows &amp;quot;hidden&amp;quot; volumes to be created within a &amp;quot;container&amp;quot; volume. The user will place important looking files within the container volume, but the sensitive data that the user is really trying to protect should be stored within the hidden volume. This method hides the data within what is thought to be hidden data. An attacker that obtains the key to the first volume would find the data that looks important, but would never see the data hidden within the second layer.&lt;br /&gt;
===== Identifying Marks =====&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
* Removes the requirement of having the CPU perform the calculations for the encryption process by performing the encryption itself.&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
* The cost of these storage devices is significantly higher than storage devices that do not perform encryption.&lt;br /&gt;
* Proper benchmarking has not been performed yet&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
* [https://www.trustedcomputinggroup.org/groups/storage/ Trusted Computing Group]&lt;br /&gt;
* [http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html ''Protect Your Data With Encryption : TrueCrypt 6.1--Tried And Tested '']&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T22:52:15Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data was encrypted before being written, the data is still protected unless the key is known. With the theft of personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or different software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. The location of technology that encrypts the data depends on the type of storage medium. For an internal storage drive or USB drive, the technology is built into the device. In the case of portable storage drives, the technology may be built into the drive or into the housing for the drive.&lt;br /&gt;
==== Advantages ====&lt;br /&gt;
* Removes the requirement of having the CPU perform the calculations for the encryption process by performing the encryption itself.&lt;br /&gt;
* &lt;br /&gt;
==== Disadvantages ====&lt;br /&gt;
* The cost of these storage devices is significantly higher than storage devices that do not perform encryption.&lt;br /&gt;
* Proper benchmarking has not been performed yet&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software encryption is offered natively in MAC OSX and Windows Vista&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;. &lt;br /&gt;
==== Advantages ====&lt;br /&gt;
Obviously.&lt;br /&gt;
==== Disadvantages ====&lt;br /&gt;
Obviously.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/158775/encrypted_drives.html ''Encrypted Drives Keep Your Files Safe'']&lt;br /&gt;
&lt;br /&gt;
[7] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T22:16:39Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;moving stuff around, got rid of the section on storage mediums because there's an entire page dedicated to that crap&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data was encrypted before being written, the data is still protected unless the key is known. With the theft/loss of hard drive with personal data becoming an issue&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;, the encryption of storage devices becomes an attractive way to avoid such issues.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through encryption technology built into the storage medium, or different software that encrypts data before writing it.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that encrypts and stores data]]&lt;br /&gt;
Hardware implementations include hard disk drives, portable storage drives, and USB flash drives. Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
==== Advantages ====&lt;br /&gt;
Obviously.&lt;br /&gt;
==== Disadvantages ====&lt;br /&gt;
Obviously. &lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software encryption is offered natively in MAC OSX and Windows Vista&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt; as well as commercial or free applications.&lt;br /&gt;
==== Advantages ====&lt;br /&gt;
Obviously.&lt;br /&gt;
==== Disadvantages ====&lt;br /&gt;
Obviously.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
* [[Cryptography in Information Security]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.pcworld.com/article/131603/tsa_hard_drive_missing.html ''TSA Hard Drive Missing'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[5] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[6] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 18:16, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T21:32:14Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Data Encryption for Storage Devices''' is a special case of ''data at rest''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; protection. Data can be encrypted through the use of software, or hardware itself can encrypt data as it is saved to the device.&lt;br /&gt;
&lt;br /&gt;
== Data Encryption ==&lt;br /&gt;
Encryption is used in cryptography to transform plaintext to ciphertext&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. In the case of storage devices, encrypted data that is stored can only be accessed with the proper authentication. Physical theft of the medium negates password protection since the data can simply be read from it. On the other hand, if the data was encrypted before being written, the data is still protected unless the key is known.&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
Data can be encrypted through the use of different software, or the storage device itself can encrypt the data.&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
Encrypted hard disks have been available since April 2008&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; but an actual standard was agreed upon and established in January 2009&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Software encryption is offered natively in MAC OSX and Windows Vista&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; as well as commercial or free applications.&lt;br /&gt;
&lt;br /&gt;
== Storage Mediums ==&lt;br /&gt;
Talk about hard drives and usb keys lol!&lt;br /&gt;
[[Image:usb_key.jpg|frame|A USB flash drive that stores encrypted data]]&lt;br /&gt;
=== Hard Disk Drives ===&lt;br /&gt;
HDD yay!&lt;br /&gt;
=== USB Keys ===&lt;br /&gt;
Thumb drives!&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Conventional Encryption Algorithms]]&lt;br /&gt;
* [[Security and Storage Mediums]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] [http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1143799,00.html Data at rest definition]&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Encryption Wikipedia:Encryption]&lt;br /&gt;
&lt;br /&gt;
[2] [http://www.pcworld.com/businesscenter/blogs/on_hardware/144919/fujitsu_ups_ante_on_integral_hard_disk_encryption.html ''Fujitsu Ups Ante on Integral Hard Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=storage&amp;amp;articleId=9126869&amp;amp;taxonomyId=19&amp;amp;intsrc=kc_top ''Coming soon: Full-disk encryption for all computer drives'']&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.pcworld.com/article/161519/whole_disk_encryption.html ''Protect Your Data With Whole-Disk Encryption'']&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://siswg.net/ IEEE Security in Storage Working Group]&lt;br /&gt;
* [http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ Disk Encryption HowTo (Linux)]&lt;br /&gt;
* [http://www.freeotfe.org/ Official FreeOTFE Website]&lt;br /&gt;
* [http://www.truecrypt.org/ Official TrueCrypt Website]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Shellya|Shellya]] 17:32, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Usb_key.jpg</id>
		<title>File:Usb key.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Usb_key.jpg"/>
				<updated>2009-04-10T20:56:17Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T00:46:12Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Introduction material here.&lt;br /&gt;
== Overview ==&lt;br /&gt;
Some words here&lt;br /&gt;
== Implementations ==&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
More words here&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Even more words&lt;br /&gt;
== See Also ==&lt;br /&gt;
Other CASWiki pages here&lt;br /&gt;
== External Links ==&lt;br /&gt;
Self explanatory &lt;br /&gt;
== References ==&lt;br /&gt;
etc etc.&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-10T00:37:58Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Introduction material here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
Some words here&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
More words here&lt;br /&gt;
&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Even more words&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
Other CASWiki pages here&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
Self explanatory &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
etc etc.&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-08T22:43:28Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;setup blarg&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Introduction material here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
Some words here&lt;br /&gt;
&lt;br /&gt;
== Implementations ==&lt;br /&gt;
=== Hardware Implementation ===&lt;br /&gt;
More words here&lt;br /&gt;
&lt;br /&gt;
=== Software Implementation ===&lt;br /&gt;
Even more words&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
etc etc.&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices</id>
		<title>Data Encryption for Storage Devices</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Data_Encryption_for_Storage_Devices"/>
				<updated>2009-04-06T15:41:15Z</updated>
		
		<summary type="html">&lt;p&gt;Shellya:&amp;#32;New page: lol&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;lol&lt;/div&gt;</summary>
		<author><name>Shellya</name></author>	</entry>

	</feed>