Commit c7ee7098 authored by Xunnamius (Zara)'s avatar Xunnamius (Zara)

conclusion up

parent 8d9d24cd
\section{Related Work}\label{sec:related}
The standard approach to FDE, using AES-XTS, introduces significant overhead.
Within the last year and a half it has been established that encryption using
\emph{stream ciphers} for FDE is faster than using AES~\cite{StrongBox,
AnotherPaper1, AnotherPaper2}. However, when used naively in drive encryption,
stream ciphers are widely known to be vulnerable to ``overwrite attacks'' like
pad reuse and rollback~\cite{KatzLindell, StrongBox}. To enable FDE using stream
ciphers, prior work explores several approaches:
Recently, it has been established that encryption using \emph{stream ciphers}
for FDE is faster than using AES~\cite{StrongBox, AnotherPaper1, AnotherPaper2}.
However, when used naively in drive encryption, stream ciphers are widely known
to be vulnerable to ``overwrite attacks'' like pad reuse and
rollback~\cite{KatzLindell, StrongBox}. To enable FDE using stream ciphers,
prior work explores several approaches:
\begin{itemize}
\item Use a non-deterministic CTR mode with specially designed cipher and
......
\section{Conclusion}\label{sec:conclusion}
\TODO{That is all, folks!}
Stream ciphers are fast and offer strong security properties, but optimizing for
performance often conflicts with other key concerns. In this paper we presented
SwitchCrypt to navigate the security and latency/energy tradeoff space via
\emph{cipher switching} in space and time. We provided empirical results
demonstrating the conditions under which different switching strategies are
optimal and explored four related cases. In all cases, we find that SwitchCrypt
achieves at least \TODO{XXX} improvement compared to static approaches.
\PUNT{\TODO{Add David to acknowledgements once we get out of anon reviews.}}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment