swMATH ID: 37375
Software Authors: Müller, T., Freiling, F.C., Dewald, A.
Description: TRESOR runs encryption securely outside RAM. Current disk encryption techniques store necessary keys in RAM and are therefore susceptible to attacks that target volatile memory, such as Firewire and cold boot attacks. We present TRESOR, a Linux kernel patch that implements the AES encryption algorithm and its key management solely on the microprocessor. Instead of using RAM, TRESOR ensures that all encryption states as well as the secret key and any part of it are only stored in processor registers throughout the operational time of the system, thereby substantially increasing its security. Our solution takes advantage of Intel’s new AES-NI instruction set and exploits the x86 debug registers in a non-standard way, namely as cryptographic key storage. TRESOR is compatible with all modern Linux distributions, and its performance is on a par with that of standard AES implementations.
Homepage: https://static.usenix.org/event/sec11/tech/full_papers/Muller.pdf
Related Software: Cryptkeeper; ARMORED; Salsa20; RamCrypt; HyperCrypt; MemShield; PixelVault; AESSE; Copker; stress-ng; TransCrypt; ChaCha; CUDA
Cited in: 2 Publications

Cited in 1 Serial

1 ACM Computing Surveys

Citations by Year