TRESOR swMATH ID: 37375 Software Authors: Müller, T., Freiling, F.C., Dewald, A. Description: TRESOR runs encryption securely outside RAM. Current disk encryption techniques store necessary keys in RAM and are therefore susceptible to attacks that target volatile memory, such as Firewire and cold boot attacks. We present TRESOR, a Linux kernel patch that implements the AES encryption algorithm and its key management solely on the microprocessor. Instead of using RAM, TRESOR ensures that all encryption states as well as the secret key and any part of it are only stored in processor registers throughout the operational time of the system, thereby substantially increasing its security. Our solution takes advantage of Intel’s new AES-NI instruction set and exploits the x86 debug registers in a non-standard way, namely as cryptographic key storage. TRESOR is compatible with all modern Linux distributions, and its performance is on a par with that of standard AES implementations. Homepage: https://static.usenix.org/event/sec11/tech/full_papers/Muller.pdf Related Software: Cryptkeeper; ARMORED; Salsa20; RamCrypt; HyperCrypt; MemShield; PixelVault; AESSE; Copker; stress-ng; TransCrypt; ChaCha; CUDA Cited in: 2 Publications Cited by 5 Authors 1 Cesati, Marco 1 Henson, Michael A. 1 Ingrassia, Emiliano 1 Picierro, Giulio 1 Santucci, Pierpaolo Cited in 1 Serial 1 ACM Computing Surveys Cited in 2 Fields 2 Computer science (68-XX) 1 Information and communication theory, circuits (94-XX) Citations by Year