TY - GEN
T1 - The analysis of windows vista disk encryption algorithm
AU - El-Fotouh, Mohamed Abo
AU - Diepold, Klaus
PY - 2008
Y1 - 2008
N2 - Windows Vista Enterprise and Ultimate editions use Bitlocker Drive Encryption as its disk encryption algorithm, and at its heart is the AES-CBC + Elephant diffuser encryption algorithm (ELEPHANT). In this paper we present our analysis of ELEPHANT using statistical tests. Our analysis has explored some weaknesses in its diffusers, thus we propose new diffusers to replace them. The new diffusers overcome the weaknesses of the original ones, and offer better and faster diffusion properties. We used the new diffusers to build variants of ELEPHANT, that possess better diffusion properties.
AB - Windows Vista Enterprise and Ultimate editions use Bitlocker Drive Encryption as its disk encryption algorithm, and at its heart is the AES-CBC + Elephant diffuser encryption algorithm (ELEPHANT). In this paper we present our analysis of ELEPHANT using statistical tests. Our analysis has explored some weaknesses in its diffusers, thus we propose new diffusers to replace them. The new diffusers overcome the weaknesses of the original ones, and offer better and faster diffusion properties. We used the new diffusers to build variants of ELEPHANT, that possess better diffusion properties.
KW - Disk encryption
KW - Windows Vista disk encryption algorithm
UR - http://www.scopus.com/inward/record.url?scp=50249159475&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-70567-3_9
DO - 10.1007/978-3-540-70567-3_9
M3 - Conference contribution
AN - SCOPUS:50249159475
SN - 354070566X
SN - 9783540705666
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 113
EP - 126
BT - Data and Applications Security XXII - 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Proceedings
T2 - 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Y2 - 13 July 2008 through 16 July 2008
ER -