Skip to main content

Questions tagged [xts]

XTS is a block cipher mode of operation, which is most commonly used when random accessible data (like a hard disk or RAM) is to be encoded.

1 vote
1 answer
85 views

If I understand correctly, XEX/XTS use a second key to create a "tweak" XORed with the plaintext before and after encryption. The tweak input starts with the encrypted sector number, but is ...
A. Que's user avatar
  • 111
2 votes
1 answer
122 views

When you have a tweakable block cipher such as Threefish and your objective is full disk encryption: Is XTS mode unnecessary? Do you just use the block-length data address (sector + offset, etc) as ...
user2684562's user avatar
5 votes
1 answer
496 views

In Android, Adiantum is an alternative to AES-XTS for devices without AES instructions. I cannot understand the reason for why such a convoluted scheme was chosen. There are 128-bit ARX block ciphers ...
DroidQ's user avatar
  • 51
0 votes
1 answer
145 views

As an example could be XTS with a 512-bit key that treats the key as one 128-bit key and one 348-bit key. As to why I'm asking it's because XTS runs on one large key that it treats like two keys. ...
I don't wanna make an account's user avatar
0 votes
0 answers
145 views

I am struggling with using Microsoft's BCrypt library in AES-XTS mode. I've confirmed that the Cipher Block Size is 16 bytes (by getting the BCRYPT_BLOCK_LENGTH property). I'm setting the Data Unit ...
PeterGV's user avatar
1 vote
1 answer
136 views

As far as I understand, the biggest problem of requesting authentication in disk encryption is that the plaintext and ciphertext are not having the same size -because of tag-. The XTS mode is already ...
NB_1907's user avatar
  • 730
1 vote
0 answers
83 views

Recently, I've been working on disk encryption. I started with the AES-XTS mode which is the standard for this purpose and tried to understand the concept of disk encryption in general. I know that ...
NB_1907's user avatar
  • 730
2 votes
0 answers
458 views

https://en.wikipedia.org/wiki/Disk_encryption_theory Why do we use XTS over CTR for disk encryption? If we used ChaCha20 (without authentication) by simply encrypting each disk sector with the same ...
Mihai's user avatar
  • 21
1 vote
1 answer
231 views

Let's suppose I encrypt something with AES-256 in XTS mode two times (there will be 4 four keys, 2 for each encryption operation), wanting to achive 512-bits of security. Will this scheme be ...
phantomcraft's user avatar
1 vote
0 answers
153 views

https://en.wikipedia.org/wiki/Disk_encryption_theory#Xor%E2%80%93encrypt%E2%80%93xor_(XEX) reads: The standard supports using a different key for the IV encryption than for the block encryption; this ...
fadedbee's user avatar
  • 978
1 vote
0 answers
82 views

This question is similar to Can XEX or XTS modes be used with only one tweak? except I am interested to know if one can instead use $X = E_{k}(0) \otimes \alpha^j \\ C = E_{k}(P \oplus X) \oplus X$ in ...
Post as a guest's user avatar
4 votes
1 answer
4k views

XTS is suitable for disk encryption while GCM doesn't. Both require the same number of block encryption calls. Both are parallel in encryption and decryption. XTS is actually even faster in openssl ...
ZAB's user avatar
  • 153
0 votes
1 answer
425 views

From Wikipedia: XTS mode is susceptible to data manipulation and tampering, and applications must employ measures to detect modifications of data if manipulation and tampering is a concern: "......
sunknudsen's user avatar
1 vote
1 answer
506 views

Often when I stumble across something interesting, I lose myself in the most overkill ways of implementing it. Today it was full disk encryption: I'm about to move to QubesOS, and I want to secure my ...
user avatar
0 votes
0 answers
192 views

My understanding about XEX/XTS mode is limited. But from what I see, it has two good properties: It is length-preserving so that encryption doesn't cost additional space. It is deterministic, which is ...
Cyker's user avatar
  • 769

15 30 50 per page