Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 316

Self-Encrypting Drives (SED) Advanced Encryption, Media Encryption Key and the Access Key

Page 316 highlights

Security is not compromised. Array Y cannot unlock the drive because it needs the SEDset key from array X. The drive can be manually converted to a spare, and doing so will instantly erase it. 7. SED array is operating normally. A drive and a controller are removed. Security is not compromised on the drive. The SEDset key cannot be found on the controller, even if it is pulled from a running system. However, cached data might be found in the controller's battery-backed RAM, which is not protected by SED or any other encryption. 8. SED array with 16 slots is populated with 8 SEDs. Then, 8 new SEDs are added. Assume the array includes 6 active drives and 2 spares. Initially, the SEDset spans the 6 active drives, so 3 drives must be lost before the key is compromised. As new drives are inserted, the SEDset resecures itself with each addition. Eventually, the SEDset spans all 14 active drives, so 7 drives must be lost before the key is compromised. Self-Encrypting Drives (SED) Advanced Encryption Advanced encryption for SEDs includes the following methods: • Media encryption key and access key • Threshold secret sharing and local keying Media Encryption Key and the Access Key This encryption method is as secure but much more flexible than encrypting directly with the access key. The access key can be changed without affecting the encrypted data, because the Media Encryption Key remains unchanged. If data were encrypted with the access key, as in the past, then changing the key would destroy data. Likewise, overwriting the Media Encryption Key does destroy data, resulting in an instantaneous cryptographic erasure of the entire drive. If a SED is not configured with an access key, then data is readable as if the drive were not self-encrypting. If a SED is configured with an access key, then the access key must be provided to unlock the drive, which remains unlocked only while powered. The drive locks itself upon losing power or shutting down, and the access key must be provided again. This information also applies to partitions of a SED (called bands by the Trusted Computing Group [TCG]). Each partition has its own Media Encryption Key and optional access key (called a BandMaster by the TCG). AutoSED configures a small unsecured band for drive labels, followed by a single secured band spanning the rest of the drive. This access key is the key that is protected by AutoSED. Threshold Secret Sharing and Local Keying The AutoSED feature is a self-contained keying system, requiring no external Key Management Service (KMS). Exclusive to Dell, automatic local keying relies upon the concept of cryptographic secret sharing as discovered by Adi Shamir and specified in the Internet Draft Threshold Secret Sharing by David McGrew (draft-mcgrew-tss-03). When a SED member is initially configured, AutoSED generates a new and unique access key. Every drive in the system is locked with this one key. Then, the Shamir algorithm is used to split the key into any number of pieces, called shares, which have the following properties: 1. For each set of shares, you can choose how many shares are needed to recover the key (for instance, 2-out-of-3 or 10-outof-20). This number is the threshold. 2. Every time the key is split into a set of shares, the shares will be different even though the key stays the same. Shares can be combined only with shares from the same set; they are incompatible with shares from any other set. 3. Shares disclose no information about the key until the threshold is reached. AutoSED always chooses to split the key such that one share is written to each active drive in the system (that is, non-spare, nonfailed, non-foreign drives). The threshold is always half that number; more precisely, it is (n+1)/2. Therefore, the SEDset can automatically unlock itself whenever half of the drives are present. For the same reason, an adversary must possess half of the drives from the same SEDset to unlock it. 316 About Self-Encrypting Drives (SEDs) and AutoSED

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Security is not compromised. Array Y cannot unlock the drive because it needs the SEDset key from array X. The drive can be
manually converted to a spare, and doing so will instantly erase it.
7.
SED array is operating normally. A drive and a controller are removed.
Security is not compromised on the drive. The SEDset key cannot be found on the controller, even if it is pulled from a running
system. However, cached data might be found in the controller’s battery-backed RAM, which is not protected by SED or any
other encryption.
8.
SED array with 16 slots is populated with 8 SEDs. Then, 8 new SEDs are added.
Assume the array includes 6 active drives and 2 spares. Initially, the SEDset spans the 6 active drives, so 3 drives must be lost
before the key is compromised. As new drives are inserted, the SEDset resecures itself with each addition. Eventually, the
SEDset spans all 14 active drives, so 7 drives must be lost before the key is compromised.
Self-Encrypting Drives (SED) Advanced Encryption
Advanced encryption for SEDs includes the following methods:
Media encryption key and access key
Threshold secret sharing and local keying
Media Encryption Key and the Access Key
This encryption method is as secure but much more
flexible
than encrypting directly with the access key. The access key can be
changed without
affecting
the encrypted data, because the Media Encryption Key remains unchanged. If data were encrypted with
the access key, as in the past, then changing the key would destroy data. Likewise, overwriting the Media Encryption Key does
destroy data, resulting in an instantaneous cryptographic erasure of the entire drive.
If a SED is not
configured
with an access key, then data is readable as if the drive were not self-encrypting.
If a SED is
configured
with an access key, then the access key must be provided to unlock the drive, which remains unlocked only
while powered. The drive locks itself upon losing power or shutting down, and the access key must be provided again.
This information also applies to partitions of a SED (called bands by the Trusted Computing Group [TCG]). Each partition has its own
Media Encryption Key and optional access key (called a BandMaster by the TCG). AutoSED
configures
a small unsecured band for
drive labels, followed by a single secured band spanning the rest of the drive. This access key is the key that is protected by
AutoSED.
Threshold Secret Sharing and Local Keying
The AutoSED feature is a self-contained keying system, requiring no external Key Management Service (KMS). Exclusive to Dell,
automatic local keying relies upon the concept of cryptographic secret sharing as discovered by Adi Shamir and
specified
in the
Internet Draft Threshold Secret Sharing by David McGrew (draft-mcgrew-tss-03).
When a SED member is initially
configured,
AutoSED generates a new and unique access key. Every drive in the system is locked
with this one key. Then, the Shamir algorithm is used to split the key into any number of pieces, called shares, which have the
following properties:
1.
For each set of shares, you can choose how many shares are needed to recover the key (for instance, 2-out-of-3 or 10-out-
of-20). This number is the threshold.
2.
Every time the key is split into a set of shares, the shares will be
different
even though the key stays the same. Shares can be
combined only with shares from the same set; they are incompatible with shares from any other set.
3.
Shares disclose no information about the key until the threshold is reached.
AutoSED always chooses to split the key such that one share is written to each active drive in the system (that is, non-spare, non-
failed, non-foreign drives). The threshold is always half that number; more precisely, it is (
n
+1)/2. Therefore, the SEDset can
automatically unlock itself whenever half of the drives are present. For the same reason, an adversary must possess half of the
drives from the same SEDset to unlock it.
316
About Self-Encrypting Drives (SEDs) and AutoSED