{"id":26866,"date":"2021-07-12T08:00:41","date_gmt":"2021-07-12T15:00:41","guid":{"rendered":"https:\/\/phisonblog.com\/?p=26866"},"modified":"2022-08-31T12:14:43","modified_gmt":"2022-08-31T19:14:43","slug":"securing-ssd-data-with-encryption-2","status":"publish","type":"post","link":"https:\/\/phisonblog.com\/zh\/securing-ssd-data-with-encryption-2\/","title":{"rendered":"\u901a\u8fc7\u52a0\u5bc6\u4fdd\u62a4 SSD \u6570\u636e"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><\/p>\n<p>Data security is one of the most critical issues in data storage, and data encryption is a leading method of data protection. By encrypting the data stored on a drive, you ensure the data remain secure even if the user loses physical control of the storage device. The encrypted data can only be unlocked and deciphered once you deliver the proper credentials.<\/p>\n<h3>\u00a0<\/h3>\n<h3>AES<\/h3>\n<p><a href=\"https:\/\/www.phison.com\/en\/s12dc-enterprise-customizable-platform\" target=\"_blank\" rel=\"noopener\">SSDs<\/a> use an AES algorithm with symmetrical encryption keys.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_01_080921.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-33640 size-full\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_01_080921.jpg\" alt=\"\" width=\"1920\" height=\"1200\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_01_080921.jpg 1920w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_01_080921-1280x800.jpg 1280w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_01_080921-980x613.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_01_080921-480x300.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1920px, 100vw\" \/><\/a><\/p>\n<p>The first is the encryption key used to encrypt all data stored on the SSD. If the SSD uses AES 256-bit encryption, this key is a 256-bit number generated randomly and stored in an encrypted format on a hidden area of the SSD. The encryption key never leaves the SSD and is known only by the SSD itself.<\/p>\n<p>The second key is the authorization key. This is set by the user, and it controls access to the SSD. If you don&#8217;t set an authorization key when you first use a drive, the SSD will appear to behave just like an unencrypted SSD. The data is still encrypted, but without a defined authorization key, the drive automatically decrypts read requests with the encryption key. Like the encryption key, the authorization key is never stored as plaintext. It is only stored in an encrypted state.<\/p>\n<h3>\u00a0<\/h3>\n<h3>TCG OPAL 2.0, Opalite and Pyrite<\/h3>\n<p>Trusted Computing Group (TCG) provides a scalable infrastructure for managing encryption of user data in a storage device. It includes extensible features. With TCG, you can manage access control to user data stored on the storage device, including control of media encryption, Key Management, and Read\/Write Lock State.<\/p>\n<p>The &#8220;TCG Storage Security Subsystem Class: Opal&#8221;, also called &#8220;Opal SSC&#8221; or just &#8220;Opal&#8221;, is an implementation profile for storage devices that incorporates this functionality.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_02_080921.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-33648 size-full\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_02_080921.jpg\" alt=\"\" width=\"1920\" height=\"1200\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_02_080921.jpg 1920w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_02_080921-1280x800.jpg 1280w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_02_080921-980x613.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_02_080921-480x300.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1920px, 100vw\" \/><\/a><\/p>\n<p>This example shows a Self-Encrypting Drive (SED)&#8211;a storage device that integrates encryption of user data. All data is encrypted when written and then decrypted when read. The drive encrypts and decrypts your data using a Media Encryption Key (MEK) generated internally in the Storage Device.<\/p>\n<p>Opal provides a mechanism by which a host application that manages the Opal functionality in the Storage Device sets an authentication credential (i.e., a password) to enable access control to the user data. The OPAL 2.0 specification accommodates block sizes appropriate for SSDs and LBA range alignment to minimize write amplification.<\/p>\n<p>For this reason, encrypted <a href=\"https:\/\/www.phison.com\/en\/solutions\/enterprise\/sata\/27-s12dc\" target=\"_blank\" rel=\"noopener\">SSDs should be OPAL 2.0-compliant<\/a> for optimal performance. They also need to be used with software that supports OPAL 2.0 since the specification is not backward-compatible.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"banner_wrapper\" style=\"height: 83px;\"><div class=\"banner  banner-29915 bottom vert custom-banners-theme-default_style\" style=\"\"><img decoding=\"async\" width=\"1080\" height=\"150\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1.jpg\" class=\"attachment-full size-full\" alt=\"\" style=\"height: 83px;\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1.jpg 1080w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1-980x136.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1-480x67.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1080px, 100vw\" \/><a class=\"custom_banners_big_link\" href=\"https:\/\/phisonblog.com\/phison-now-offering-industry-best-secure-ssd-solutions-with-fips-140-2-certification-2\/\"><\/a><div class=\"banner_caption\" style=\"\"><div class=\"banner_caption_inner\"><div class=\"banner_caption_text\" style=\"\">Read: Phison Now Offering Industry-Best Secure SSD Solutions With FIPS 140-2 Certification<\/div><\/div><\/div><\/div><\/div>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_03_080921.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-33649 size-full\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_03_080921.jpg\" alt=\"\" width=\"1920\" height=\"1200\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_03_080921.jpg 1920w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_03_080921-1280x800.jpg 1280w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_03_080921-980x613.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_03_080921-480x300.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1920px, 100vw\" \/><\/a><\/p>\n<p>There are two new specifications in response to a request from the NVMe workgroup: Opalite and Pyrite. These two specifications are a subset of Opal. The primary difference between Opal and Opalite is that Opalite defines a single, global locking range, whereas Opal defines several configurable locking ranges. Opalite limits the number of supported users to two.<\/p>\n<p>Pyrite is almost identical to Opalite, with one primary difference: Pyrite does not specify capabilities for cryptographic protection of data at rest. That means Pyrite does not support capabilities related to encryption and cryptographic erasure.<\/p>\n<p>&nbsp;<\/p>\n<h3>SHA and RSA<\/h3>\n<p>An SSD&#8217;s firmware is the code set that controls an SSD. Developers code firmware in much the same way as they code software. Software compilation has traditionally been considered a one-way operation. However, it is theoretically possible for a hacker to reverse-engineer a binary file to extract the source code. So, firmware developers need to identify when the firmware has been tampered with and prevent malicious firmware from being installed on a storage device. Generally, manufacturers use digital signatures for firmware upgrading, which means that digital signatures are essential for securing storage devices.<\/p>\n<p>The RSA cryptosystem creates, manages, and secures digital signatures. When a program runs in an OS, the OS reads and displays that signature, and the user can verify that the software comes from a trusted vendor.<\/p>\n<p>The digital signature also ensures that the firmware has not been tampered with and isn&#8217;t counterfeit. You can secure the firmware update process with a digital signature. Every drive interface, including SATA and NVMe, has a defined command sequence that sends a new binary code to a storage drive. This tells the drive to replace the current firmware. To ensure this command does not deliver incorrect firmware, the drive checks the target firmware for the correct model and type.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_04_080921-1.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-33651 size-full\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_04_080921-1.jpg\" alt=\"\" width=\"1920\" height=\"1200\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_04_080921-1.jpg 1920w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_04_080921-1-1280x800.jpg 1280w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_04_080921-1-980x613.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/1074820_SSDControllerWPSec_04_080921-1-480x300.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1920px, 100vw\" \/><\/a><\/p>\n<h3>Securing data stored on SSDs<\/h3>\n<p>Ensuring the security of user data and protecting the integrity of SSD firmware against attacks is a top priority for every SSD manufacturer. The safest data storage devices include full encryption of user data, but data security is still of the utmost importance even without encryption. So, both encrypted and non-encrypted SSDs have features that protect the integrity of the SSD firmware, providing added protection of user data.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"banner_wrapper\" style=\"height: 83px;\"><div class=\"banner  banner-29919 bottom vert custom-banners-theme-default_style\" style=\"\"><img decoding=\"async\" width=\"1080\" height=\"150\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1-1.jpg\" class=\"attachment-full size-full\" alt=\"\" style=\"height: 83px;\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1-1.jpg 1080w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1-1-980x136.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/07\/Phison-Now-Offering-Industry-Best-Secure-SSD-Solutions...-1-1-480x67.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1080px, 100vw\" \/><a class=\"custom_banners_big_link\" href=\"https:\/\/phisonblog.com\/securing-ssds-with-code-signing-and-digital-signatures-2\/\"><\/a><div class=\"banner_caption\" style=\"\"><div class=\"banner_caption_inner\"><div class=\"banner_caption_text\" style=\"\">Read: Securing SSDs with Code Signing and Digital Signatures<\/div><\/div><\/div><\/div><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security is one of the most critical issues in data storage, and data encryption is a leading method of data protection. By encrypting the data stored on a drive, you ensure the data remain secure even if the user loses physical control of the storage device. The encrypted data can only be unlocked and [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":26911,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[23,110],"tags":[22],"class_list":["post-26866","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-posts","category-security","tag-long-content"],"acf":[],"_links":{"self":[{"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/posts\/26866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/comments?post=26866"}],"version-history":[{"count":1,"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/posts\/26866\/revisions"}],"predecessor-version":[{"id":43038,"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/posts\/26866\/revisions\/43038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/media\/26911"}],"wp:attachment":[{"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/media?parent=26866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/categories?post=26866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phisonblog.com\/zh\/wp-json\/wp\/v2\/tags?post=26866"}],"curies":[{"name":"\u53ef\u6e7f\u6027\u7c89\u5242","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}