which is the same problem that he has when attacking
the other hard drive (encrypted only using CBC). Al-
though we helped the attacker significantly by provid-
ing him with the tweak key, he still have to attack the
CBC layer. This shows that attacking ELEPHANT is
not easier than attacking just CBC, and ELEPHANT
is at least as secure as CBC.
By applying the same methodology,
ELEPHANT
+
and ELEPHANT
∗
are at least se-
cure as SCC, however they possess a higher SF than
ELEPHANT.
8 CONCLUSIONS
In this paper, we proposed a novel mode of operation
for disk encryption applications. We analyzed this
mode with the state of the art modes. Our proposed
mode is superior than the other modes, as it possesses
a high throughput. Although, it was designed based
on the CBC mode, it can be parallelized and does not
suffer from the bit-flipping attack. We used this mode
to modify Windows Vista’s encryption algorithm, to
enhance some of its diffusion properties together with
the ability to be partially parallelized.
REFERENCES
Anderson, R. and Biham, E. (1996). Two practical and
provable secure block ciphers: BEAR and LION. In
Dieter Gollmann, editor, Fast Software Encryption:
Third International Workshop (FSE’96).
Crowley, P. (2001). Mercy: a fast large block cipher for disk
sector encryption. In Bruce Schneier, editor, Fast Soft-
ware Encryption: 7th International Workshop, FSE
2000.
Daemen, J. and Rijmen, V. (1998). AES Proposal: Rijndael.
http://citeseer.ist.psu.edu/daemen98aes.html.
Davidson, J. and Jinturkar, S. (1995). An Aggressive Ap-
proach to Loop Unrolling. Technical report, Depart-
ment of Computer Science. University of Virginia.
Charlottesville.
El-Fotouh, M. and Diepold, K. (2007). Statistical Testing
for Disk Encryption Modes of Operations. Cryptology
ePrint Archive, Report 2007/362.
El-Fotouh, M. and Diepold, K. (2008a). Dynamic Substitu-
tion Model. In 22nd Annual IFIP WG 11.3 Working
Conference on Data and Applications Security (DB-
SEC’08), Naples, Italy.
El-Fotouh, M. and Diepold, K. (2008b). The Analysis of
Windows Vista Disk Encryption Algorithm. In The
Fourth International Conference on Information As-
surance and Security (IAS’08), London, UK.
Ferguson, N. (2006). AES-CBC + Elephant diffuser :
A Disk Encryption Algorithm for Windows Vista.
http://download.microsoft.com/download/0/2/3/
0238acaf-d3bf-4a6d-b3d6-
0a0be4bbb36e/BitLockerCipher200608.pdf.
Fluhrer, S. (2002). Cryptanalysis of the Mercy block cipher.
In Mitsuru Matsui, editor, Fast Software Encryption,
8th International Workshop, FSE 2001.
Fruhwirth, C. (2005). New Methods in Hard Disk Encryp-
tion. http://clemens.endorphin.org/nmihde/nmihde-
A4-ds.pdf.
Gladman, B. (2006). AES optimized C/C++ code. http: //
fp.gladman.plus.com/ AES /index.htm.
IEEE P1619 Email Archive (2007). http:// grouper.ieee.org/
groups/ 1619/ email/ thread.html.
IEEE P1619 homepage (2007). Draft 18 for P1619:
Standard Architecture for Encrypted Shared Stor-
age Media. http://attachments.wetpaintserv.us/
Wbr7V2GY67Sxaxbw6ZFBeQ %3D%3D262488.
Liskov, M., Rivest, R., and Wagner, D. (2002). Tweakable
Block Ciphers. In CRYPTO ’02: Proceedings of the
22nd Annual International Cryptology Conference on
Advances in Cryptology.
Lucks, S. (1996). BEAST: A fast block cipher for arbitrary
blocksizes. In Patrick Horster, editor, Communica-
tions and Multimedia Security II, Proceedings of the
IFIP TC6/TC11 International Conference on Commu-
nications and Multimedia Security.
May, L., Henricksen, M., Millan, W., Carter, G., and Daw-
son, E. (2002). Strengthening the Key Schedule of
the AES. In ACISP ’02: Proceedings of the 7th Aus-
tralian Conference on Information Security and Pri-
vacy, pages 226–240, London, UK. Springer-Verlag.
McGrew, D. (2002). Counter Mode Secu-
rity: Analysis and Recommendations.
http://citeseer.ist.psu.edu/mcgrew02counter.html.
McGrew, D. (2004). PRP Modes Compari-
son IEEE P1619.2. http://grouper.ieee.org/
groups/1619/email/pdf00050.pdf.
Menezes, A., Oorschot., P. V., and Vanstone, S. (1996).
Handbook of Applied Cryptography. CRC Press.
NIST (2007). Guide to Storage Encryp-
tion Technologies for End User Devices.
http://csrc.nist.gov/publications/nistpubs/800-
111/SP800-111.pdf.
Rogaway, P. (2003). Efficient Instantiations of Tweak-
able Block ciphers and Refinements to Modes
OCB and PMAC. http://citeseer.ist.psu.edu/ rog-
away03efficient.html.
Rogaway, P., Bellare, M., Black, J., and Krovetz, T. (2001).
OCB: a block-cipher mode of operation for efficient
authenticated encryption. In ACM Conference on
Computer and Communications Security, pages 196–
205.
Schroeppel, R. (1998). The Hasty Pudding cipher. The first
AES conference, NIST.
Trusted Computing Group (2008). TCG TPM Specification
Version 1.2. www. trustedcomputinggroup.org.
THE SUBSTITUTION CIPHER CHAINING MODE
429