TCG Storage Specifications and Key Management

01/12/2009 White Paper

“Key management is the hardest part of cryptography and often the Achilles’ heel of an otherwise secure system.” _ Bruce Schneier, Preface to Applied Cryptography, Second Edition.

The Trusted Computing Group has published specifications for trusted storage. Storage manufacturers have announced and shipped products designed to those specifications, including self-encrypting drives (SED), both hard (rotating) drives and solid state drives, for laptops and data centers. Not only is cryptographic key management simplified and available for SEDs today, but recent work on key management holds great promise for unifying and standardizing key management for SEDs and other cryptographic systems across the enterprise.

To read more, please download “TCG Storage Specifications and Key Management.”

“Key management is the hardest part of cryptography and often the Achilles’ heel of an otherwise secure system.” _ Bruce Schneier, Preface to Applied Cryptography, Second Edition.

The Trusted Computing Group has published specifications for trusted storage. Storage manufacturers have announced and shipped products designed to those specifications, including self-encrypting drives (SED), both hard (rotating) drives and solid state drives, for laptops and data centers. Not only is cryptographic key management simplified and available for SEDs today, but recent work on key management holds great promise for unifying and standardizing key management for SEDs and other cryptographic systems across the enterprise.

To read more, please download “TCG Storage Specifications and Key Management.”