|

The study of the CryptoAPI Linux encryption alghoritms in the context of work with the USB-drivers

Authors: Borodin D.S., Fedorov P.V.
Published in issue: #4(33)/2019
DOI: 10.18698/2541-8009-2019-4-459


Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics

Keywords: USB driver, loadable kernel module, CryptoAPI, encryption, symmetric encryption algorithms, AES, DES, Cast6, ARC4
Published: 03.04.2019

The encryption algorithms provided by CryptoAPI Linux for choosing the most efficient to work with encryption and decryption of data on USB-drives are investigated. A classification of such algorithms is given, their advantages and disadvantages, as well as criteria for algorithms estimation, are indicated. The study of the algorithms speed characteristics depending on the performance of the processor has been carried out. A comparison of the selected algorithms with similar algorithms by performance has been conducted. The main system calls of CryptoAPI Linux are considered, as well as ways to register the driver in the Linux operating system and its interaction with system devices. A description of the model of interaction with USB storage system is given.


References

[1] Axelson J. USB mass storage: designing and programming devices and embedded hosts. Lakeview Research, 2006.

[2] Corbet J., Rubini A. Linux device drivers. O’Reilly Media, 2005.

[3] Linux source code: drivers. elixir.bootlin.com: website. URL: http://lxr.free-electrons.com/source/drivers (accessed: 12.12.2018).

[4] Venkateswaran S. Essential Linux device drivers. Prentice Hall, 2008.

[5] Johns M. Anatomiya podsistemy SCSI v Linux [Anatomy of SCSI system in Linux]. ibm.com: website (in Russ.). URL: http://www.ibm.com/developerworks/ru/library/l-scsi-subsystem/index.html (accessed: 12.12.2018).

[6] Satran J., Meth K., Sapuntzakis C., et al. Internet small computer systems interface (iSCSI). RFC 3720. The Internet Society, 2003.

[7] Grabbe J.O. The DES algorithm illustrated. Laissez Faire City Times, 1992, vol. 2, no. 28, pp. 12–15.

[8] Daemen J., Rijmen V. The design of Rijndael. Springer, 2002.

[9] CAST-6 encryption standard. tools.ietf.org: website. URL: https://tools.ietf.org/html/rfc2612 (accessed: 12.12.2018).

[10] Ball B. Cryptography with ARC4 LPC2148. opencore.eesc.usp.br: website. URL: http://www.opencore.eesc.usp.br/ricardo/Antena/nrf24l01_tutorial_4.pdf (accessed: 12.12.2018).