{"id":399195,"date":"2024-10-20T04:41:10","date_gmt":"2024-10-20T04:41:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1619-1-2018-2\/"},"modified":"2024-10-26T08:29:14","modified_gmt":"2024-10-26T08:29:14","slug":"ieee-1619-1-2018-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1619-1-2018-2\/","title":{"rendered":"IEEE 1619.1-2018"},"content":{"rendered":"

Revision Standard – Active. Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 1619.1\u2122-2018 Front cover <\/td>\n<\/tr>\n
2<\/td>\nTitle page <\/td>\n<\/tr>\n
4<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
7<\/td>\nParticipants <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\nContents <\/td>\n<\/tr>\n
10<\/td>\n1.\u2002Overview
1.1\u2002Scope
1.2\u2002Purpose
1.3\u2002Description of clauses and annexes <\/td>\n<\/tr>\n
11<\/td>\n2.\u2002Normative references
3.\u2002Definitions, acronyms, abbreviations, etc.
3.1\u2002Definitions <\/td>\n<\/tr>\n
14<\/td>\n3.2\u2002Acronyms and abbreviations <\/td>\n<\/tr>\n
15<\/td>\n3.3\u2002Mathematical conventions
4.\u2002General concepts
4.1\u2002Introduction <\/td>\n<\/tr>\n
16<\/td>\n4.2\u2002Components <\/td>\n<\/tr>\n
18<\/td>\n4.3\u2002Plaintext record formatter
4.4\u2002Plaintext record de-formatter <\/td>\n<\/tr>\n
19<\/td>\n4.5\u2002Encryption routine <\/td>\n<\/tr>\n
20<\/td>\n4.6\u2002Decryption routine <\/td>\n<\/tr>\n
21<\/td>\n4.7\u2002Cryptographic parameters <\/td>\n<\/tr>\n
22<\/td>\n5.\u2002Cryptographic modes
5.1\u2002Overview <\/td>\n<\/tr>\n
23<\/td>\n5.2\u2002Counter with cipher block chaining-message authentication code (CCM)
5.3\u2002Galois\/Counter Mode (GCM) <\/td>\n<\/tr>\n
24<\/td>\n5.4\u2002Cipher block chaining with keyed-hash message authentication code (CBC-HMAC) <\/td>\n<\/tr>\n
26<\/td>\n5.5\u2002Xor-encrypt-xor with tweakable block-cipher with keyed-hash message authentication code (XTS-HMAC) <\/td>\n<\/tr>\n
27<\/td>\n6.\u2002Cryptographic key management and initialization vector requirements
6.1\u2002Random bit generator <\/td>\n<\/tr>\n
28<\/td>\n6.2\u2002Cryptographic key entry and export
6.3\u2002Handling the cipher key
6.4\u2002Cryptographic key wrapping on the storage medium <\/td>\n<\/tr>\n
29<\/td>\n6.5\u2002Initialization vector (IV) requirements <\/td>\n<\/tr>\n
30<\/td>\n6.6\u2002Creating unique IVs within a self-contained group <\/td>\n<\/tr>\n
32<\/td>\nAnnex A (informative) Bibliography <\/td>\n<\/tr>\n
34<\/td>\nAnnex B (informative) Security concerns
B.1\u2002Threat model
B.2\u2002Maintaining cryptographic key security <\/td>\n<\/tr>\n
35<\/td>\nB.3\u2002Replay attacks
B.4\u2002Passing plaintext to the host before checking the MAC <\/td>\n<\/tr>\n
36<\/td>\nB.5\u2002Checking for integrity of a cryptographic key
B.6\u2002Avoiding collisions of initialization vectors <\/td>\n<\/tr>\n
37<\/td>\nB.7\u2002Examples of IV collision avoidance strategies <\/td>\n<\/tr>\n
38<\/td>\nB.8\u2002How many records to encrypt with one key? <\/td>\n<\/tr>\n
40<\/td>\nAnnex C (informative) Documentation summary <\/td>\n<\/tr>\n
41<\/td>\nAnnex D (informative) Test vectors
D.1\u2002General <\/td>\n<\/tr>\n
42<\/td>\nD.2\u2002CCM-128-AES-256 test vectors <\/td>\n<\/tr>\n
44<\/td>\nD.3\u2002GCM-128-AES-256 test vectors <\/td>\n<\/tr>\n
46<\/td>\nD.4\u2002CBC-AES-256-HMAC-SHA test vectors (including HMAC-SHA-1, HMAC-SHA-256, and HMAC-SHA-512) <\/td>\n<\/tr>\n
50<\/td>\nD.5\u2002XTS-AES-256-HMAC-SHA-512 test vectors <\/td>\n<\/tr>\n
55<\/td>\nBack cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2018<\/td>\n55<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":399198,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-399195","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/399195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/399198"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=399195"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=399195"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=399195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}