White Paper

Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

Issue link: https://read.uberflip.com/i/1173418

Contents of this Issue

Navigation

Page 6 of 7

7 While QDI worked to achieve FIPS 140-2, CC, and CSfC certification for the BGA device, the UAV design team moved ahead with the effort to create the final two-layer CSfC End User Device (EUD) solution. The UAV design team selected a Trusted Integrator and together the two teams planned a robust CSfC security solution implemented using the BGA de- vice as the HWFDE component and a SWFDE component as the second security layer. Careful consideration is given by the Trusted Integrator to properly select the correct second security layer for this specific mission. Together the two layer solution provides protection for the boot code, sensor processing, and EW algorithms used by the UAV mission com- puting system. To simplify the implementation, the Trusted Integrator team suggested an identical HWFDE and SWFDE solution to protect the sensor data collected during missions. Of course, the encryption keys for each layer are randomly generated and distinct from each other. Mission Success Working together at an accelerated pace, the UAV team, QDI, and the Trusted Integrator complete the security implementation and perform a final review the NSA Data at Rest Capability Package, make some final adjustments, some improvements, and conduct final system testing. Af- ter months of effort, the system is ready for EUD registration and review by the NSA. Approval is achieved, and two of the UAVs used during prototype security testing are configured and prepared for trial missions. In a few days, the first of the sophisticated UAVs successfully launches and guides itself toward the remote mining facility. Hours later, the ve- hicle returns loaded with Giga-Bytes of sensor data that analysts eagerly review. There are no indications that the UAV had been detected dur- ing the mission. A second, then a third mission is completed. In a few weeks, missions are running around the clock. Construction at the min- ing facility is complete and large amounts of raw ore move every night to a hereto unknown processing facility located near a large rural power plant. As expected, the sensors on the UAV detect minute amounts of a radio-active mineral but surprisingly dust collectors in the UAV also capture large amounts of highly toxic beryllium metal in dust emanating from the mining facility. While Beryllium has some justifiable commer- cial uses, the element's high melting point, light weight, and strength find numerous uses in defense applications such as missiles, aircraft, spacecraft, and nuclear reactors. With the mission declared a success the UAV team moves to their next project -- a covert underwater drone. Like the airborne UAV, the under- water drone needs superior protection for data at rest. The lessons learned during the UAV project will easily transfer to the underwater drone application. Implementing a Secure SSD The integration of security into a military data storage device is not a trivial task. Mercury's Application Engineering Team assists customers with the design and implementation of custom security solutions. Mercury has a wide breadth of product offerings for applications requir- ing various levels of security. Our TRRUST-Stor® portfolio of Secure SSDs is available in multiple form factors, including the industry-standard 2.5", mSATA, XMC, and ultra-compact BGA. The most recent addition to Mercury's SSD portfolio is the ASURRE-Stor™ SSD, available with FIPS 140-2 certification and eligibility to be used as a HWFDE component in a properly configured and deployed 2-layer CSfC registered solution. Please note that Mercury Systems is not a Trusted Integrator. Contact Mercury's Secure SSD team at secure.ssd@mrcy.com. 1 https://www.nsa.gov/resources/everyone/csfc/ 2 https://www.nsa.gov/resources/everyone/csfc/assets/files/faqs-non-technical.pdf 3 For more information, please refer to https://www.niap-ccevs.org/Profile/PP.cfm 4 R. Micheloni (ed.), 3D Flash Memories, Springer Science + Business Media, 2016, retrieved from https://goo.gl/BdLwcR Reference Websites CSfC Website: https://www.nsa.gov/resources/everyone/csfc/ CSfC Capability Packages: https://www.nsa.gov/resources/everyone/csfc/capability-packages/ CSfC Data At Rest Capability Package: https://www.nsa.gov/resources/everyone/csfc/capability-packages/#data-at-rest CSfC Components List: https://www.nsa.gov/resources/everyone/csfc/components-list/ CSfC Trusted Integrators List: https://www.nsa.gov/resources/everyone/csfc/trusted-integrator-list.shtml CSfC Frequently Asked Questions: https://www.nsa.gov/resources/everyone/csfc/faq.shtml National Information Assurance Partnership: https://www.niap-ccevs.org/Product/ Mercury Systems ASURRE-Stor SSD: http://www.mrcy.com/CSfC Mercury Systems Secure SSD Portfolio: https://www.mrcy.com/military-grade-secure-solid-state-drives/ Acronyms Acronym Definition 3D-NAND Three-Dimensional NAND flash AES Advanced Encryption Standard BGA Ball Grid Array CBC Cipher Block Chaining COTS Commercial Off-The-Shelf CP Capability Package CSfC Commercial Solutions for Classified CSS Central Security Service DAR Data At Rest ECC Error Correction Code FDE Full Disk Encryption FE File Encryption FIPS Federal Information Processing Standard GCM Galois/Counter Mode GOTS Government Off-The-Shelf HDD Hard Disk Drive HF DAR solution designation for HWFDE and FE HS DAR solution designation for HWFDE and SWFDE HWFDE Hardware Full Disk Encryption MLC Multi-Level Cell NAND flash mSATA Mobile SATA NIAP National Information Assurance Partnership NSA National Security Agency PE Platform Encryption PF DAR solution designation for PE and FE SF DAR solution designation for SWFDE and FE SLC Single-Level Cell NAND flash SSD Solid State Drive SWFDE Software Full Disk Encryption TLC Triple-Level Cell NAND flash WLAN Wireless Local Area Network XEX Xor-encrypt-xor XMC Switched Mezzanine Card XTS XEX with ciphertext stealing

Articles in this issue

Links on this page

view archives of White Paper - Demystifying Hardware Full Disk Encryption Technology for Military Data Storage