Confidential Data Storage and
           Deletion

            PRESENTED
                By



          A.KIRAN KUMAR
                  (08581A0526)
C O N TEN TS
   Introd uction
   C onfid ential D ata Storage
   Techniques of confid ential storage
   Encryption
   Sym m etric and asym m etric encryption
   Ad vanced Encryption Stand ard (AES)
   H ard ware-based C onfid ential Storage techniques
   C onfid ential D ata Erasure
   Physical D estruction
   D ata O verwriting
   Encryption with K ey Erasure
                                                         2
   C onclusion
INTRODUC TION
   Many computers store data about personal finances, online transactions,
    tax records, passwords for bank accounts and emails.

   All these sensitive information are vulnerable to theft and also leaked
    accidentally due to improper disposal of storage media.

   To protect the secrecy of the entire data lifetime, we must have
    confidential ways to store and delete data.

   This seminar describes the most commonly used encryption
    algorithm, Advanced Encryption System (AES) which is used for
    many of the confidential data storage methods and also describes the
    confidential data erasure methods such as physical destruction, data
    overwriting methods and Key erasure.
                                                                              3
C ONFIDE NTIA L DA TA
                STORA GE
   Achieving confidentiality means storing data in a way that can be read
    only by authorized persons. No unauthorized persons should be able to
    read or otherwise obtain meaningful information from this data, even
    with physical access to the storage media.
                  UNIX Storage Path      Windows Storage Path
                       Application          Application         User

                                                                Kernel
                          VFS              I/O Manager



                        File System      File System Driver


                                           Storage Device
                       Block Layer         Drivers


                                                                             4
                        Storage             Storage
                        Media               Media
TECHNIQUES OF CONFIDENTIAL
                      STORAGE
   There are two basic techniques of confidential storage:
                 1. Software-based confidential storage techniques


                            I. Encryption
                           II. Advanced Encryption Standard (AES)


                2. Hardware-based confidential storage techniques

                           I. Secure Flash Drives
                           II. Enclosures and Extension Cards
                           III. Encrypted Hard Drives



                                                                     5
STO RAGE
                     E NC RYPTION
   Encryption is the process of transforming information (referred to
    as plaintext) using an algorithm (called cipher) to make it
    unreadable to anyone except those possessing special knowledge,
    usually referred to as a key.

   There are two basic techniques for encrypting information.


         1. Symmetric encryption (secret key encryption)
         2. Asymmetric encryption ( public key encryption).




                                                                         6
SYM M ETRIC AN D ASYM M ETRIC
        EN C RYPTIO N




                                7
A DVA NC E D E NC RYPTION
                       STA NDA RD (A E S)
   The Advanced Encryption Standard (AES)                      specifies a FIPS(Federal
    Information Processing Standard)-approved                    cryptographic algorithm
    that can be used to protect electronic data.                The AES algorithm is a
    symmetric block cipher that can encrypt                      (encipher) and decrypt
    (decipher) information.
         128 bit plain text
                                                            K
                                    Round Keys (128 Bits)
                                                            E
     Pre Round Transformation                               Y                     Cipher Key
                                            K0                               (128, 192 or 256 bits)

              Round 1
                                                            E
                                            K1              X
                                                                           Nr     Key Size
                                                            P
              Round 2
                                            K2              A              10     128
                  .                          .
                  .                          .
                                             .              N              12     192
     Round N (Slightly Different)
                                             .              S
                                           KNr              I              14     256
                                                            O                                     8
           128 bit cipher text
                                                            N
H ARD WARE-BASED C O N FID EN TIAL
           STO RAGE TEC H N IQ U ES
   Secure Flash Drives: Some secure flash drives provide only
    software encryption using block-based encryption methods as
    mentioned. Other flash drives protect data through cryptographic
    mechanisms provided on the flash drive itself.


   Enclosures and Extension Cards: Enclosures and extension
    cards can employ good encryption techniques and do not divulge any
    information about files or the structure of the file system on disk.


   Encrypted Hard Drives: Seagate [2006] is introducing “Drive
    Trust Technology” into their Momentus 5400 FDE series notebook
    hard drives, which implement full disk encryption. This technology is
    implemented in the hard drive firmware and provides encryption,
    decryption, hashing (for passwords), digital signature, and random-
                                                                            9
    number generation functions.
CONFIDENTIAL DATA ERASURE
   When confidential data have to be removed, we must be sure that once
    deleted, the data can no longer be restored. A full secure data lifecycle
    implies that data is not only stored securely, but deleted in a secure
    manner as well.

   CMRR scanning microscopes , Magnetic force microscopy and
    magnetic force scanning & tunneling microscopy analyze the polarity
    of the magnetic domains of the electronic storage medium and can
    recover data in minutes.

   Confidential data deletion can be accomplished in three ways:


                           1.Physical Destruction
                           2.Data Overwriting
                           3.Encryption with Key Erasure                        10
PH YSIC AL D ESTRU C TIO N
     The Department of Defense government document(DoD)states that
    classified material may be destroyed by numerous methods:


                           1. Smelting
                           2. Shredding
                           3. Sanding
                           4. Pulverization
                           5. Acid bath
                           6. Magnetic degaussing

   Physical destruction methods provide great confidentiality. we cannot
    securely delete only one file using these methods. Therefore, this
    method does not support flexible security policies.
   Since physical destruction can destroy large amounts of data in a         11
    relatively short amount of time, the performance in this sense is quite
    good.
DATA OVERWRITING
   Write new data on top of existing data and thus erase the
    previously existing data.
   The Department of Defense document suggests an overwrite with a
    character, its compliment, then a random character, as well as other
    software-based, overwrite methods that refer to non-volatile electronic
    storage as listed below:
ID                        ERASURE METHOD
    C   Overwrite all addressable locations with a character
    D   Overwrite all addressable locations with a             character,   its
        complement, then a random character and verify
    E   Overwrite all addressable locations        with   a    character,   its
        complement, then a random character
    H   Overwrite all locations with a random pattern, with binary zeros,
        and then with binary ones
                                                                                  12
ENCRYPTION WITH KEY
                     ERASURE
   The third way to delete data securely is to encrypt the data and then
    securely erase the key. The encryption key is often securely deleted
    using overwriting methods. This combination allows for much faster
    secure deletion in that only a small key is overwritten instead of the
    entire file (which could be very large).

   if the encryption key is protected by a password and the password is
    merely forgotten, the strength of the secure deletion is directly
    correlated to the strength of the password.

   It is best to delete the encryption key(s) securely through physical
    destruction or overwriting methods. The ease-of-use characteristic is
    degraded in that the user must destroy the key explicitly.

                                                                             13
C O N C L U SIO N
   This Seminar took a look at the methods, advantages, and limitations of
    confidential storage and deletion methods for electronic media in a non-
    distributed, single-user environment, with a dead forensic attack model.
   We compared confidential data handling methods using characteristics
    associated with confidentiality, policy, ease-of-use, and performance.
   By compiling experiences and constraints of various confidential storage
    and deletion techniques, we hope that knowledge from this Seminar is
    very helpful.t




                                                                               14
15

Cofidential data storage and deletion 2003 (2)

  • 1.
    Confidential Data Storageand Deletion PRESENTED By A.KIRAN KUMAR (08581A0526)
  • 2.
    C O NTEN TS  Introd uction  C onfid ential D ata Storage  Techniques of confid ential storage  Encryption  Sym m etric and asym m etric encryption  Ad vanced Encryption Stand ard (AES)  H ard ware-based C onfid ential Storage techniques  C onfid ential D ata Erasure  Physical D estruction  D ata O verwriting  Encryption with K ey Erasure 2  C onclusion
  • 3.
    INTRODUC TION  Many computers store data about personal finances, online transactions, tax records, passwords for bank accounts and emails.  All these sensitive information are vulnerable to theft and also leaked accidentally due to improper disposal of storage media.  To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data.  This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods and also describes the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure. 3
  • 4.
    C ONFIDE NTIAL DA TA STORA GE  Achieving confidentiality means storing data in a way that can be read only by authorized persons. No unauthorized persons should be able to read or otherwise obtain meaningful information from this data, even with physical access to the storage media. UNIX Storage Path Windows Storage Path Application Application User Kernel VFS I/O Manager File System File System Driver Storage Device Block Layer Drivers 4 Storage Storage Media Media
  • 5.
    TECHNIQUES OF CONFIDENTIAL STORAGE  There are two basic techniques of confidential storage: 1. Software-based confidential storage techniques I. Encryption II. Advanced Encryption Standard (AES) 2. Hardware-based confidential storage techniques I. Secure Flash Drives II. Enclosures and Extension Cards III. Encrypted Hard Drives 5
  • 6.
    STO RAGE E NC RYPTION  Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  There are two basic techniques for encrypting information. 1. Symmetric encryption (secret key encryption) 2. Asymmetric encryption ( public key encryption). 6
  • 7.
    SYM M ETRICAN D ASYM M ETRIC EN C RYPTIO N 7
  • 8.
    A DVA NCE D E NC RYPTION STA NDA RD (A E S)  The Advanced Encryption Standard (AES) specifies a FIPS(Federal Information Processing Standard)-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. 128 bit plain text K Round Keys (128 Bits) E Pre Round Transformation Y Cipher Key K0 (128, 192 or 256 bits) Round 1 E K1 X Nr Key Size P Round 2 K2 A 10 128 . . . . . N 12 192 Round N (Slightly Different) . S KNr I 14 256 O 8 128 bit cipher text N
  • 9.
    H ARD WARE-BASEDC O N FID EN TIAL STO RAGE TEC H N IQ U ES  Secure Flash Drives: Some secure flash drives provide only software encryption using block-based encryption methods as mentioned. Other flash drives protect data through cryptographic mechanisms provided on the flash drive itself.  Enclosures and Extension Cards: Enclosures and extension cards can employ good encryption techniques and do not divulge any information about files or the structure of the file system on disk.  Encrypted Hard Drives: Seagate [2006] is introducing “Drive Trust Technology” into their Momentus 5400 FDE series notebook hard drives, which implement full disk encryption. This technology is implemented in the hard drive firmware and provides encryption, decryption, hashing (for passwords), digital signature, and random- 9 number generation functions.
  • 10.
    CONFIDENTIAL DATA ERASURE  When confidential data have to be removed, we must be sure that once deleted, the data can no longer be restored. A full secure data lifecycle implies that data is not only stored securely, but deleted in a secure manner as well.  CMRR scanning microscopes , Magnetic force microscopy and magnetic force scanning & tunneling microscopy analyze the polarity of the magnetic domains of the electronic storage medium and can recover data in minutes.  Confidential data deletion can be accomplished in three ways: 1.Physical Destruction 2.Data Overwriting 3.Encryption with Key Erasure 10
  • 11.
    PH YSIC ALD ESTRU C TIO N  The Department of Defense government document(DoD)states that classified material may be destroyed by numerous methods: 1. Smelting 2. Shredding 3. Sanding 4. Pulverization 5. Acid bath 6. Magnetic degaussing  Physical destruction methods provide great confidentiality. we cannot securely delete only one file using these methods. Therefore, this method does not support flexible security policies.  Since physical destruction can destroy large amounts of data in a 11 relatively short amount of time, the performance in this sense is quite good.
  • 12.
    DATA OVERWRITING  Write new data on top of existing data and thus erase the previously existing data.  The Department of Defense document suggests an overwrite with a character, its compliment, then a random character, as well as other software-based, overwrite methods that refer to non-volatile electronic storage as listed below: ID ERASURE METHOD C Overwrite all addressable locations with a character D Overwrite all addressable locations with a character, its complement, then a random character and verify E Overwrite all addressable locations with a character, its complement, then a random character H Overwrite all locations with a random pattern, with binary zeros, and then with binary ones 12
  • 13.
    ENCRYPTION WITH KEY ERASURE  The third way to delete data securely is to encrypt the data and then securely erase the key. The encryption key is often securely deleted using overwriting methods. This combination allows for much faster secure deletion in that only a small key is overwritten instead of the entire file (which could be very large).  if the encryption key is protected by a password and the password is merely forgotten, the strength of the secure deletion is directly correlated to the strength of the password.  It is best to delete the encryption key(s) securely through physical destruction or overwriting methods. The ease-of-use characteristic is degraded in that the user must destroy the key explicitly. 13
  • 14.
    C O NC L U SIO N  This Seminar took a look at the methods, advantages, and limitations of confidential storage and deletion methods for electronic media in a non- distributed, single-user environment, with a dead forensic attack model.  We compared confidential data handling methods using characteristics associated with confidentiality, policy, ease-of-use, and performance.  By compiling experiences and constraints of various confidential storage and deletion techniques, we hope that knowledge from this Seminar is very helpful.t 14
  • 15.