CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap

One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to higher resistance to brute force and other types of attacks. Since accepted cryptographic design principles dictate that larger key lengths also impose higher processing costs, increasing the security of a cryptographic file system also increases the overhead of the underlying cipher.

[1]  Margo I. Seltzer,et al.  Building a reliable mutable file system on peer-to-peer storage , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..

[2]  Angelos D. Keromytis,et al.  The Design of the {OpenBSD} Cryptographic Framework , 2003, USENIX Annual Technical Conference, General Track.

[3]  Giuseppe Cattaneo,et al.  Design and Implementation of a Transparent Cryptographic File System for Unix , 2007 .

[4]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[5]  Daniel Pierre Bovet,et al.  Understanding the Linux Kernel , 2000 .

[6]  Stefan Ludwig,et al.  File system encryption with integrated user management , 2001, OPSR.

[7]  Poul-Henning Kamp GBDE-GEOM Based Disk Encryption , 2003, BSDCon.

[8]  Adi Shamir,et al.  The Steganographic File System , 1998, Information Hiding.

[9]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[10]  Marco Cesati,et al.  Understanding the Linux Kernel - from I / O ports to process management: covers Linux Kernel version 2.4 (2. ed.) , 2005 .

[11]  Matt Blaze,et al.  A cryptographic file system for UNIX , 1993, CCS '93.

[12]  P. Le Corbeiller Large-Scale Digital Calculating Machinery , 1948 .

[13]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[14]  Timothy Roscoe,et al.  Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.

[15]  Markus G. Kuhn,et al.  StegFS: A Steganographic File System for Linux , 1999, Information Hiding.

[16]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[17]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[18]  Erez Zadok,et al.  Cryptfs: A Stackable Vnode Level Encryption File System , 1998 .