A:DES (Data Encryption Standard) was originally introduced by NSA (National Security Agency) and IBM and has since become a Federal data encryption standard as defined in FIPS 46-3 (Federal Information Processing Standard). DES works on 64-bit data segments with a 64-bit key of which 8 bits provide parity, resulting in a 56-bit effective length. A variant on DES is TDES, in which the plain text is processed three times with two or three different DES secret keys. With two encryption keys used, the result is an encryption equivalent to using a 112-bit (128-bit) key. With three keys, the result is an encryption equivalent to using a 168-bit (192-bit) key. In practice with a 128-bit TDES, the plain text is encrypted with the first key, decrypted with the second key, and then encrypted again with the first key.

Q:How is key length related to security?

A:In general, a larger key length creates a stronger cipher, which means an eavesdropper must spend more time and resources to find the decryption key. For instance, 240 (a DES 40-bit strength) represent a key space of 1,099,511,627,776 possible combinations. While this number seems impressive, it is definitely feasible for a microprocessor or a specially designed ASIC to perform the huge number of calculations necessary to derive the key. Thus a 40-bit length cipher offers a bare minimum protection for your confidentiality and privacy. Fortunately the “work factor” increases exponentially as we increase the key length.

Q:Such that X-WallLX-40(DES 40-bit strength) is insecure?

A:Not true. Above explained Secure Key finding process is specifically relating to decrypting software-based encryption. The innovative X-Wallhardware based encryption solution increases the difficulties tremendously as every guess of the Secret Key requires a hardware reset (power on). To break an X-WallLX-40encrypted hard drive, one must process at least 500 billion times (50% of the available key space) reboot. As such, X-Walleven with its DES 40-bit strength will be strong enough against massive computer attacks.

Q:How would I make sure the security offered by X-Wall LX is solid?

A:The DES/TDES hardware engine that X-Wall LX utilized has been certified by the

NIST (National Institute of Standards and Technology) and CSE (The Canadian Security Establishment), for which the certificates can be reviewed on NIST web

links:http://csrc.nist.gov/cryptval/des/desval.html& http://csrc.nist.gov/cryptval/des/tripledesval.html. These hardware algorithms are certified to provide reliable security; at full strength it is nearly impossible to access the encrypted data by guessing or deriving the right DES/TDES Key. Because everything on the disk is encrypted, your data is safe even if attackers try to boot from their own disk, or to move your disk to an unprotected machine.

Q:Why do I need to use the Secure Key?

A:The X-Wall Secure Key covers 5 characters as we set on HDD encryption. It contains the DES/TDES Secret Keythat is used by X-Wall LX to encrypt or decrypt data. Without the key, the protected disk drive cannot be booted and there is no access into the PC. Together the X-Wall Secure Key and X-Wall LX comprise an effective user authentication for access control and encryption for data protection. The X-Wall Secure Key serves as user authentication for access control while X-Wall LX encrypts and decrypts.

Q:What happens if my Secure Key is lost or stolen?

Hard Disk Encryption

C-3

Page 142
Image 142
TAG MIL-BOOK 200 Series manual How is key length related to security?

MIL-BOOK 200 Series specifications

The TAG MIL-BOOK 200 Series is a significant advancement in the realm of rugged mobile computing, designed specifically for demanding environments where durability and reliability are paramount. With its robust construction, this series proves to be an ideal solution for military, industrial, and outdoor applications.

One of the defining features of the TAG MIL-BOOK 200 Series is its MIL-STD-810G compliance. This military standard ensures that the device can withstand extreme conditions such as shock, vibration, humidity, and temperature fluctuations. Additionally, the series boasts an IP65 rating, indicating its resistance to dust and water ingress, making it suitable for use in harsh weather conditions.

The device is equipped with a powerful Intel processor, which guarantees optimal performance for resource-intensive applications. Enhanced graphics capabilities make the TAG MIL-BOOK 200 Series suitable for applications that require high-resolution visuals, such as geographic information systems and simulation software.

Another key characteristic of the TAG MIL-BOOK 200 Series is its versatility in connectivity options. Users can take advantage of multiple ports, including USB 3.0, HDMI, and Ethernet, as well as wireless technologies such as Wi-Fi and Bluetooth. This ensures seamless integration into any networked environment and facilitates communication and data transfer in real-time.

The display of the TAG MIL-BOOK 200 Series is designed to be easily readable in bright sunlight, featuring anti-glare technology that enhances visibility in outdoor settings. The touchscreen capability offers intuitive interaction, which can be particularly beneficial for personnel who are often on the go.

The battery life of the TAG MIL-BOOK 200 Series is optimized for extended use, allowing operators to remain productive throughout long missions without the need for frequent recharging. This feature is especially crucial in field operations, where access to power sources may be limited.

In conclusion, the TAG MIL-BOOK 200 Series combines cutting-edge technologies and rugged characteristics to deliver a reliable computing solution for users in extreme environments. Its durability, performance, and comprehensive connectivity options make it an indispensable tool for military and industrial applications, ensuring that operators can perform their duties efficiently and effectively under any circumstances.