GB2264373A - Data encryption. - Google Patents

Data encryption. Download PDF

Info

Publication number
GB2264373A
GB2264373A GB9202451A GB9202451A GB2264373A GB 2264373 A GB2264373 A GB 2264373A GB 9202451 A GB9202451 A GB 9202451A GB 9202451 A GB9202451 A GB 9202451A GB 2264373 A GB2264373 A GB 2264373A
Authority
GB
United Kingdom
Prior art keywords
data
tape
stored
key
common key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9202451A
Other versions
GB9202451D0 (en
GB2264373B (en
Inventor
Mark Nolan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EUROLOGIC RESEARCH Ltd
Original Assignee
EUROLOGIC RESEARCH Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EUROLOGIC RESEARCH Ltd filed Critical EUROLOGIC RESEARCH Ltd
Priority to GB9202451A priority Critical patent/GB2264373B/en
Publication of GB9202451D0 publication Critical patent/GB9202451D0/en
Publication of GB2264373A publication Critical patent/GB2264373A/en
Application granted granted Critical
Publication of GB2264373B publication Critical patent/GB2264373B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

An apparatus 10 for encrypting data to be stored on a tape 11 or other storage medium includes means 20 to encrypt different blocks of data using respective different keys which are derived from a common key as a function of the storage location of the data. The different keys may alternatively be derived from the common key as a function of the position of a filename in an index or the quantity of data to be stored. <IMAGE>

Description

DATA ENCRYPTION APPARATUS AND METHOD This patent relates to an apparatus and method for the encryption of computer data before storage.
Modern encryption algorithms use a number called a key. Each key uniquely defines the way data is to be encrypted.
One way of deciphering encrypted data without knowing the key is to compare known plain data with the same data when encrypted. In this way a translation table for all values of input data, and the corresponding encrypted data, can be built up. To prevent this it is recommended that a new key is used each time a block of data is encrypted.
For added security it is also recommended that the way in which data is encrypted is a function of the data itself as well as of the key. A unit of input data is encrypted and the result is fed back to modify how the next unit is to be encrypted. This mode of operation is known as 'Cipher Feedback'.
To achieve these two objectives on a tape drive a random key would normally be generated, encrypted using a fixed key and stored with each block of data on the tape. A 'block' of data may consist of either all the data stored on a tape or some smaller subdivision.
This method has disadvantages however.
Because of cipher feedback each unit of output encrypted data is a function of the data which precedes it. If the data block chosen is the entire tape then in order to read from a particular location on the tape all data which precedes that tape position must be decrypted. This slows down the read operation considerably.
If the data block chosen is some smaller subdivision of the tape contents then a new key must be stored with each block of data on the tape. This reduces the amount of plain data that can be stored.
Furthermore when a number of blocks are to be read from the tape the key must be read and changed for each block required. This also slows down the read operation considerably. The structure of the data on the tape is also considerably different from that intended by the host computer adding considerably to the computational overhead required to keep requested operations compatible with those executed by the tape drive.
It is therefore the object of the invention to provide an apparatus and method which can subdivide the data stored on tape or other storage medium into blocks each of which are uniquely encrypted, without storing a separate key for each block.
Accordingly, the present invention provides a method of encrypting data to be stored on a storage medium, wherein different blocks of data are encrypted using respective different keys which are derived from a common key as a function of the storage location of the data.
The invention further provides an apparatus for encrypting data to be stored on a storage medium, including means to encrypt different blocks of data using respective different keys which are derived from a common key as a function of the storage location of the data.
The embodiment of the invention to be described, which relates to the storage of data on tape, uses a single key on each tape of data, common to all the data.
The particular key used to encrypt or decrypt a given data block is then produced by modifying the common key by a number which corresponds with the location on the tape, as reported by the tape drive, which may or may not correspond to a physical location on the tape, at which the data is to be stored. The tape position is measured in terms of 'Filemarks' and 'Save Set Marks' although it is recognised that many other units could be used. All the data from a filemark, save set mark or the beginning of tape up to the subsequent filemark or save set mark are treated as a block of data for the purpose of encryption.
A 'Filemark' is a special recorded element, containing no user data, which is stored on the tape to separate logical groupings of data from each other.
A 'Save Set Mark' is also a special recorded element containing no user data, which provides a segmentation scheme hierarchically superior to a filemark.
The embodiment of the invention will now be described, by way of example, with reference to the accompanying drawings, in which: Figure 1 is a block diagram of an apparatus for encryption of data according to the embodiment of the invention; and Figure 2 is a flow diagram of the main program steps performed by the microprocessor in Figure 1.
The embodiment is designed for use with tape drives which use the so-called 'Small Computer System Interface' (SCSI). Normally a tape drive 11 is directly connected to a host computer 12 via a SCSI cable (SCSI bus). When the encryption/decryption apparatus 10 according to the embodiment of the invention is installed, two SCSI cables are used - one cable 13 which connects to the host computer 12 and a second cable 14 which connects to the tape drive 11. In this way all data transferred to or from the tape drive passes through the apparatus 10 and can be encrypted or decrypted as required.
The apparatus 10 has on each side a respective interface 15, 16 to the SCSI bus 13, 14 respectively.
The host computer interface 15 can, under the control of a microprocessor 17, transfer data directly to or from a host memory buffer 18. The target tape drive interface 16 can, under the control of the microprocessor 17, transfer data to or from the host memory buffer 18 or a target memory buffer 19. There is also an encryption block 20, and this can also transfer data to or from the host memory buffer 18 and the target memory buffer 19, under the control of the microprocessor 17.
The host computer interface 15, the tape drive interface 16 and the encryption block 20 access the memory buffers 18 and 19 using a request signal. This signal indicates to a memory block that a byte of data is ready to be read or written. Whether a particular memory block responds to that request is controlled by the microprocessor 17. The microprocessor can, in this way, switch on and off the flow of data into and out of a particular memory buffer from a particular source or destination. It also determines the address in the memory buffer at which the data is to be stored.
If encryption or decryption is not required both interfaces 15 and 16 transfer data to and from the host memory buffer 18.
If decryption or encryption is required the host and target interfaces 15 and 16 transfer data to or from their respective memory buffers 18 and 19. The microprocessor 17 passes the encryption key to the encryption block 20 and sets it to either encrypt or decrypt. The data is then transferred through the encryption block 20 from one of the memory buffers 18, 19 into the other, according to the direction of data flow, i.e. according to whether data is being encrypted or decrypted. The encryption block 20 may operate to encrypt/decrypt the data according to any desired encryption algorithm, such as the DES algorithm.
A keypad 21 is used to configure the operation of the apparatus 10 and to select the single encryption key for a tape. This key, which is to be common to all the data on the tape, is stored on the tape before any data is written to the tape. A display 22 is used to show status and error information and the current configuration.
Figure 2 is a flow diagram showing the main steps of the program controlling the microprocessor 17.
After initialisation 30, 31, during which the microprocessor 17 reads the common encryption key stored on the tape and stores it in the unit 10, the microprocessor 17 waits for a command to be sent from the host computer, step 32. It then establishes whether or not the command involves any movement of the tape, step 33. If not, the command is executed, step 34, and the microprocessor waits for further commands. If it does involve tape movement, the anticipated amount of movement is calculated and stored, step 35. The microprocessor then ascertains whether any transfer of encrypted data is required, steps 36 and 37. If not, the command is executed, step 38. If it does involve the transfer of encrypted data then the stored encryption key is modified by the current tape position, step 39. The new encryption key is then passed to the encryption block, step 40, and the encryption block is set to encrypt or decrypt, step 41. The required command is then executed at step 38. The stored tape position is then modified by the actual tape movement which has occurred, step 42. This movement may differ from that anticipated when a command is initiated. The end of tape may, for example, be reached. If such an error does occur the actual amount of tape movement can be calculated from information received from the tape drive.
As previously stated the tape position is measured in terms of filemarks and save set marks. A count is kept of the number of save set marks which exist between the start of the tape and the actual tape position. The filemarks are counted from the previous save set mark, or from the beginning of the tape if no save set marks exist, up to the actual tape position.
The filemark counter is reset, therefore, after each save set mark.
The key is changed after each filemark or save set mark. The key used is as follows: New key = Common key for tape + Set~count * 1000000h + File~count where 'Set~count' is the save set mark counter and 'File~count' is the filemark counter as described above.
All data up to the next filemark or save set mark is encrypted using this key.
Various modifications are possible within the scope of the invention. For example, the invention can be used for other storage media such as disk drives, optical disk drives, optical tape drives, random access memory, read only memories, paper tape, magnetic core memory, bubble memory, punch cards, medium changers and others yet to be developed.
Also, other methods can be used to establish the storage location of data, as reported by the storage device, such as beginning of medium, end of medium, addresses, tape partitions, disk partitions, disk sectors, tape tracks, data frames, storage block number, files, file descriptor blocks, end of data marker, file number, etc.
It is further recognised that instead of using the position of the data to modify the common key for each data block, the position of a filename in an index could be used to modify the common encryption key for each block, or the quantity of data in the block could be used to modify the common key.
Further, the invention can be used to encrypt and decrypt data on two ends of a bus, for example a SCSI bus, to protect the bus itself.
It is further recognised that the invention could be used in relation to other interfaces such as ST506, ESDI, SMD, FI, PERTEK, STC, QIC-02, proprietary interfaces and others yet to be developed and to use command protocols other than SCSI-1 and SCSI-2.
The invention is not limited to the embodiments described herein which may be modified or varied without departing from the scope of the invention.

Claims (9)

CLAIMS:
1. An apparatus for encrypting data to be stored on a storage medium, including means to encrypt different blocks of data using respective different keys which are derived from a common key as a function of the storage location of the data.
2. An apparatus as claimed in Claim 1, wherein the storage medium is a tape.
3. An apparatus as claimed in Claim 2, wherein the common key is common to all the data on the tape and is stored on the tape.
4. An apparatus as claimed in Claim 3, wherein the storage location of the data is measured in terms of filemarks and save set marks.
5. An apparatus as claimed in Claim 4, wherein a block of data comprises all the data from a filemark, save set mark or the beginning of tape up to the subsequent filemark or save set mark.
6. An apparatus as claimed in Claim 5 wherein the key for a particular block of data is derived according to the following formula: Key for block = Common key for tape + Set~count * 1000000h + file count.
7. A method of encrypting data to be stored on a storage medium wherein different blocks of data are encrypted using respective different keys which are derived from a common key as a function of the storage location of the data.
8. An apparatus for encrypting data to be stored on a storage medium, including means to encrypt different blocks of data using respective different keys which are derived from a common key as a function of the position of a filename in an index or of the quantity of data stored.
9. A method for encrypting data substantially as described with reference to the accompanying drawings.
9. A method of encrypting data to be stored on a storage medium wherein different blocks of data are encrypted using respective different keys which are derived from a common key as a function of the position of a filename in an index or of the quantity of data stored.
10. An apparatus for encrypting data substantially as described with reference to the accompanying drawings.
11. A method for encrypting data substantially as described with reference to the accompanying drawings.
7. A method of encrypting data to be stored on a storage medium wherein different blocks of data are encrypted using respective different keys which are derived from a common key as a function of the storage location of the data.
8. An apparatus for encrypting data substantially as described with reference to the accompanying drawings.
GB9202451A 1992-02-05 1992-02-05 Data encryption apparatus and method Expired - Fee Related GB2264373B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9202451A GB2264373B (en) 1992-02-05 1992-02-05 Data encryption apparatus and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9202451A GB2264373B (en) 1992-02-05 1992-02-05 Data encryption apparatus and method

Publications (3)

Publication Number Publication Date
GB9202451D0 GB9202451D0 (en) 1992-03-18
GB2264373A true GB2264373A (en) 1993-08-25
GB2264373B GB2264373B (en) 1995-12-20

Family

ID=10709883

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9202451A Expired - Fee Related GB2264373B (en) 1992-02-05 1992-02-05 Data encryption apparatus and method

Country Status (1)

Country Link
GB (1) GB2264373B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0820017A2 (en) * 1996-07-19 1998-01-21 International Business Machines Corporation Secondary storage data protection apparatus placing encryption circuit in I/O subsystem
EP0855652A1 (en) * 1997-01-28 1998-07-29 Sagem Sa Method of preserving software integrity
WO1999041877A2 (en) * 1998-02-13 1999-08-19 Nokia Mobile Phones Limited Method and arrangement for ciphering information transfer
EP0770950A3 (en) * 1995-10-27 2001-05-02 SCM Microsystems, Inc. Encryption key system and method
EP1187483A2 (en) * 2000-09-07 2002-03-13 Eastman Kodak Company An encryption apparatus and method for synchronizing multiple encryption keys with a data stream
WO2002025410A2 (en) * 2000-09-15 2002-03-28 Koninklijke Philips Electronics N.V. Protect by data chunk address as encryption key
WO2002037239A2 (en) * 2000-11-02 2002-05-10 Artec Design Group OÜ Data encryption device based on protocol analysis
US6798602B2 (en) 2002-06-25 2004-09-28 International Business Machines Corporation Window based directory for magnetic tape
WO2005043396A2 (en) * 2003-09-30 2005-05-12 Infineon Technologies Ag Word-individual key generation
GB2419434A (en) * 2004-10-23 2006-04-26 Qinetiq Ltd Encrypting data on a computer's hard disk with a key derived from the contents of a memory
GB2431251A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer device
GB2431249A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Removable data storage item and key distribution
GB2431252A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer device
GB2431254A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer system
GB2431488A (en) * 2005-10-11 2007-04-25 Hewlett Packard Development Co Data transfer device
US7269259B1 (en) * 2000-05-01 2007-09-11 Xtex, Incorporated Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
WO2008127408A2 (en) * 2006-11-08 2008-10-23 Micron Technology, Inc. Method and system for encryption of information stored in an external nonvolatile memory
WO2009040204A1 (en) * 2007-09-28 2009-04-02 Gemalto Sa Method for generating masks in a communicating object and corresponding communicating object
US7962763B2 (en) 2006-02-01 2011-06-14 Hewlett-Packard Development Company, L.P. Data transfer device
US8549297B1 (en) 2005-10-11 2013-10-01 Hewlett-Packard Development Company, L.P. Data transfer device library and key distribution
US10073743B2 (en) 2006-07-26 2018-09-11 Hewlett Packard Enterprise Development Lp Data storage arrangement and key distribution

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2456425A1 (en) * 1979-05-10 1980-12-05 Thomson Brandt METHOD FOR ENCODING BINARY SIGNALS FOR NUMBERING IMAGES STORED ON A RECORDING MEDIUM AND DEVICE FOR READING SIGNALS THUS CODED
US5081675A (en) * 1989-11-13 1992-01-14 Kitti Kittirutsunetorn System for protection of software in memory against unauthorized use
FR2680892A1 (en) * 1991-09-03 1993-03-05 Gemplus Card Int METHOD FOR AUTHENTICATING DATA.

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0770950A3 (en) * 1995-10-27 2001-05-02 SCM Microsystems, Inc. Encryption key system and method
EP0820017A3 (en) * 1996-07-19 1998-03-11 International Business Machines Corporation Secondary storage data protection apparatus placing encryption circuit in I/O subsystem
EP0820017A2 (en) * 1996-07-19 1998-01-21 International Business Machines Corporation Secondary storage data protection apparatus placing encryption circuit in I/O subsystem
EP0855652A1 (en) * 1997-01-28 1998-07-29 Sagem Sa Method of preserving software integrity
FR2758898A1 (en) * 1997-01-28 1998-07-31 Sagem METHOD FOR PRESERVING SOFTWARE DATA INTEGRITY
US6813355B1 (en) 1998-02-13 2004-11-02 Nokia Mobile Phones Limited Method and arrangement for ciphering information transfer
WO1999041877A2 (en) * 1998-02-13 1999-08-19 Nokia Mobile Phones Limited Method and arrangement for ciphering information transfer
WO1999041877A3 (en) * 1998-02-13 1999-09-30 Nokia Mobile Phones Ltd Method and arrangement for ciphering information transfer
US7269259B1 (en) * 2000-05-01 2007-09-11 Xtex, Incorporated Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
EP1187483A2 (en) * 2000-09-07 2002-03-13 Eastman Kodak Company An encryption apparatus and method for synchronizing multiple encryption keys with a data stream
US7242772B1 (en) 2000-09-07 2007-07-10 Eastman Kodak Company Encryption apparatus and method for synchronizing multiple encryption keys with a data stream
EP1187483A3 (en) * 2000-09-07 2003-09-24 Eastman Kodak Company An encryption apparatus and method for synchronizing multiple encryption keys with a data stream
WO2002025410A3 (en) * 2000-09-15 2003-03-20 Koninkl Philips Electronics Nv Protect by data chunk address as encryption key
WO2002025410A2 (en) * 2000-09-15 2002-03-28 Koninklijke Philips Electronics N.V. Protect by data chunk address as encryption key
WO2002037239A3 (en) * 2000-11-02 2004-02-19 Artec Design Group Oue Data encryption device based on protocol analysis
WO2002037239A2 (en) * 2000-11-02 2002-05-10 Artec Design Group OÜ Data encryption device based on protocol analysis
US6798602B2 (en) 2002-06-25 2004-09-28 International Business Machines Corporation Window based directory for magnetic tape
WO2005043396A2 (en) * 2003-09-30 2005-05-12 Infineon Technologies Ag Word-individual key generation
WO2005043396A3 (en) * 2003-09-30 2005-07-07 Infineon Technologies Ag Word-individual key generation
GB2419434A (en) * 2004-10-23 2006-04-26 Qinetiq Ltd Encrypting data on a computer's hard disk with a key derived from the contents of a memory
GB2431251A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer device
US7818587B2 (en) 2005-10-11 2010-10-19 Hewlett-Packard Development Company, L.P. Data transfer system encrypting data with information unique to a removable data storage item
GB2431488A (en) * 2005-10-11 2007-04-25 Hewlett Packard Development Co Data transfer device
GB2431252A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer device
GB2431249A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Removable data storage item and key distribution
US9251007B1 (en) 2005-10-11 2016-02-02 Hewlett Packard Enterprise Development Lp Data storage arrangement and key distribution
US8549297B1 (en) 2005-10-11 2013-10-01 Hewlett-Packard Development Company, L.P. Data transfer device library and key distribution
US7934105B1 (en) 2005-10-11 2011-04-26 Hewlett-Packard Development Company, L.P. Data transfer device
GB2431254A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer system
GB2431252B (en) * 2005-10-11 2010-06-09 Hewlett Packard Development Co Data transfer device
US7962763B2 (en) 2006-02-01 2011-06-14 Hewlett-Packard Development Company, L.P. Data transfer device
US10073743B2 (en) 2006-07-26 2018-09-11 Hewlett Packard Enterprise Development Lp Data storage arrangement and key distribution
WO2008127408A3 (en) * 2006-11-08 2009-01-08 Micron Technology Inc Method and system for encryption of information stored in an external nonvolatile memory
WO2008127408A2 (en) * 2006-11-08 2008-10-23 Micron Technology, Inc. Method and system for encryption of information stored in an external nonvolatile memory
EP2053568A1 (en) * 2007-09-28 2009-04-29 Gemplus Method for generating masks in a communicating object and corresponding communicating object
WO2009040204A1 (en) * 2007-09-28 2009-04-02 Gemalto Sa Method for generating masks in a communicating object and corresponding communicating object

Also Published As

Publication number Publication date
GB9202451D0 (en) 1992-03-18
GB2264373B (en) 1995-12-20

Similar Documents

Publication Publication Date Title
GB2264373A (en) Data encryption.
US8234500B2 (en) Apparatus and method for securing data on a portable storage device
EP1975838A2 (en) Storage virtualization apparatus comprising encryption functions
US5748744A (en) Secure mass storage system for computers
EP0827065A2 (en) Method and system for sharing storage device via mutually different interfaces
US7653796B2 (en) Information recording medium and region management method for a plurality of recording regions each managed by independent file system
US7882354B2 (en) Use of device driver to function as a proxy between an encryption capable tape drive and a key manager
US9324361B2 (en) Protecting stored data from traffic analysis
JP2002041249A (en) Access control method and storage device using this
JPH0427580B2 (en)
US20080010396A1 (en) Apparatus and method for managing key in library apparatus
CN105224882B (en) A kind of file encryption system based on bridge file system
US20020138747A1 (en) Restricted data access
IE68584B1 (en) Data encryption apparatus and method
EP1797560A2 (en) Method and device for storing data on a record medium and for transferring information
JP2980940B2 (en) Magneto-optical information recording / reproducing method
EP0425125A2 (en) System with a multi-function optical disk and drive for it
US6161155A (en) Apparatus and method for storing retrievable boundary information into a buffer memory of a receiving device
US20090164513A1 (en) Method and Apparatus For Mapping Encrypted and Decrypted Data Via Key Management System
JP2001067268A (en) Method for managing contents, and storage medium
JPH01303547A (en) Control system for information memory
EP0080878A2 (en) Cache memory and method of control for use with magnetic disks
CN116070295B (en) Data processing system
US6704754B1 (en) Method for shared use of medium-exchangeable storage device for purposes of backup and file system, and medium-exchangeable recording system
JP2001014219A (en) Method and device for controlling cache

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 19990205