{"id":262,"date":"2021-05-19T23:00:23","date_gmt":"2021-05-19T15:00:23","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=262"},"modified":"2021-05-19T23:00:23","modified_gmt":"2021-05-19T15:00:23","slug":"%e5%85%a8%e7%a3%81%e7%a2%9f%e5%8a%a0%e5%af%86%ef%bc%88full-disk-encryption%ef%bc%89","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=262","title":{"rendered":"\u5168\u78c1\u789f\u52a0\u5bc6\uff08Full Disk Encryption\uff09"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210519\/20132160l8dBhua0Gk.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210519\/20132160l8dBhua0Gk.jpg\"><br>\u5168\u78c1\u789f\u52a0\u5bc6\uff08FDE\uff09\u53ef\u4ee5\u662f\u4fdd\u8b77\u975c\u614b\u6578\u64da\u7684\u8edf\u4ef6\u6216\u786c\u4ef6\u89e3\u6c7a\u65b9\u6848\u3002\u57fa\u65bc\u786c\u4ef6\u7684\u5168\u78c1\u789f\u52a0\u5bc6\u901a\u5e38\u7a31\u70ba\u81ea\u52a0\u5bc6\u9a45\u52d5\u5668\uff08SED\uff09\uff0c\u901a\u5e38\u7b26\u5408OPAL\uff08\u4f8b\u5982<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/encrypted-hard-drive\" target=\"_blank\" rel=\"noreferrer noopener\">Windows\u7684\u52a0\u5bc6\u786c\u76e4\u9a45\u52d5\u5668<\/a>\uff09\u548c\u7531Trusted Computing Group\uff08TCG\uff09\u958b\u767c\u7684\u4f01\u696d\u6a19\u6e96\u3002\u201c\u5167\u7f6e\u5728\u9a45\u52d5\u5668\u4e2d\u6216\u9a45\u52d5\u5668\u6a5f\u7bb1\u4e2d\u7684\u57fa\u65bc\u786c\u4ef6\u7684\u52a0\u5bc6\u5c0d\u7528\u6236\u4f86\u8aaa\u662f\u900f\u660e\u7684\u3002\u9664\u555f\u52d5\u8eab\u4efd\u9a57\u8b49\u5916\uff0c\u8a72\u9a45\u52d5\u5668\u7684\u904b\u884c\u65b9\u5f0f\u8207\u4efb\u4f55\u9a45\u52d5\u5668\u76f8\u540c\uff0c\u4e26\u4e14\u4e0d\u6703\u964d\u4f4e\u6027\u80fd\u3002\u8207\u78c1\u789f\u52a0\u5bc6\u8edf\u4ef6\u4e0d\u540c\uff0c\u5b83\u6c92\u6709\u5fa9\u96dc\u6027\u6216\u6027\u80fd\u958b\u92b7\uff0c\u56e0\u70ba\u6240\u6709\u52a0\u5bc6\u5c0d\u65bc\u64cd\u4f5c\u7cfb\u7d71\u548c\u4e3b\u6a5f\u8a08\u7b97\u6a5f\u8655\u7406\u5668\u90fd\u662f\u4e0d\u53ef\u898b\u7684\u3002\u201d \uff08<a href=\"https:\/\/en.wikipedia.org\/wiki\/Hardware-based_full_disk_encryption\" target=\"_blank\" rel=\"noreferrer noopener\">\u7dad\u57fa\u767e\u79d1<\/a>\uff09<\/p>\n\n\n\n<p><strong>\u8eab\u4efd\u9a57\u8b49\u548c\u6a5f\u5bc6\u6027(Authentication and Confidentiality)<\/strong><br>SED\u901a\u904e\u9396\u5b9a\u9a45\u52d5\u5668\u548c\u52a0\u5bc6\u6578\u64da\u4f86\u589e\u5f37\u5b89\u5168\u6027\u3002\u958b\u6a5f\u6642\u9700\u8981\u4f7f\u7528\u8eab\u4efd\u9a57\u8b49\u5bc6\u9470\uff08AK\uff09\u4f86\u89e3\u9396\u9a45\u52d5\u5668\uff08\u89e3\u5bc6DEK\uff09\uff0c\u7136\u5f8c\u6578\u64da\u52a0\u5bc6\u5bc6\u9470\uff08DEK\uff09\u89e3\u5bc6\u6578\u64da\u3002SED\u4e0d\u6703\u5c07DEK\u5b58\u5132\u5728\u53ef\u4fe1\u5e73\u53f0\u6a21\u584a\uff08TPM\uff09\u4e2d\uff0c\u8a72\u5e73\u53f0\u901a\u5e38\u4ee5\u6bcd\u677f\u6216\u82af\u7247\u96c6\u7d44\u4ef6\u7684\u5f62\u5f0f\u5be6\u73fe\u3002<\/p>\n\n\n\n<p><strong>\u6578\u64da\u52a0\u5bc6\u5bc6\u9470\uff08Data Encryption Key:DEK\uff09<\/strong><br>. \u7528\u65bc\u52a0\u5bc6\u548c\u89e3\u5bc6\u6578\u64da\u3002<br>. \u7531\u9a45\u52d5\u5668\u751f\u6210\uff0c\u4e26\u4e14\u6c38\u4e0d\u96e2\u958b\u9a45\u52d5\u5668\uff08\u672a\u5b58\u5132\u5728TPM\u4e0a\uff09\u3002<br>. \u5982\u679c\u66f4\u6539\u6216\u64e6\u9664\uff0c\u5247\u7121\u6cd5\u89e3\u5bc6\u4ee5\u524d\u7684\u73fe\u6709\u6578\u64da\u3002<\/p>\n\n\n\n<p><strong>\u53ef\u4fe1\u5e73\u53f0\u6a21\u584a(Trusted Platform Module)<\/strong><br>\u4ee5\u4e0b\u662f<a href=\"https:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module\" target=\"_blank\" rel=\"noreferrer noopener\">\u7dad\u57fa\u767e\u79d1<\/a>\u7684\u6458\u9304\uff1a<br>\u53ef\u4fe1\u5e73\u53f0\u6a21\u584a\uff08TPM\uff0c\u4e5f\u7a31\u70baISO \/ IEC 11889\uff09\u662f\u5b89\u5168\u5bc6\u78bc\u8655\u7406\u5668\u7684\u570b\u969b\u6a19\u6e96\uff0c\u5b89\u5168\u5bc6\u78bc\u8655\u7406\u5668\u662f\u4e00\u7a2e\u5c08\u7528\u5fae\u63a7\u5236\u5668\uff0c\u65e8\u5728\u901a\u904e\u96c6\u6210\u7684\u5bc6\u78bc\u5bc6\u9470\u4f86\u4fdd\u8b77\u786c\u4ef6\u3002<br>TPM 2.0\u5be6\u73fe\u6709\u4e94\u7a2e\u4e0d\u540c\u985e\u578b\uff1a<br>. \u96e2\u6563TPM\u662f\u5c08\u7528\u82af\u7247\uff0c\u5b83\u5011\u5728\u81ea\u5df1\u7684\u9632\u7be1\u6539\u534a\u5c0e\u9ad4\u5c01\u88dd\u4e2d\u5be6\u73feTPM\u529f\u80fd\u3002\u5f9e\u7406\u8ad6\u4e0a\u8b1b\uff0c\u5b83\u5011\u662fTPM\u7684\u6700\u5b89\u5168\u7684\u985e\u578b\uff0c\u56e0\u70ba\u8207\u5728\u8edf\u4ef6\u4e2d\u5be6\u73fe\u7684\u4f8b\u7a0b\u76f8\u6bd4\uff0c\u5728\u786c\u4ef6\u4e2d\u5be6\u73fe\u7684\u4f8b\u7a0b\u61c9\u8a72\u5c0d\u932f\u8aa4\uff08\u9700\u8981\u6f84\u6e05\uff09\u6709\u66f4\u5f37\u7684\u62b5\u6297\u529b\uff0c\u4e26\u4e14\u5b83\u5011\u7684\u8edf\u4ef6\u5305\u5fc5\u9808\u5177\u6709\u4e00\u5b9a\u7684\u6297\u7be1\u6539\u6027\u3002<br>. \u96c6\u6210\u7684TPM\u662f\u53e6\u4e00\u500b\u82af\u7247\u7684\u4e00\u90e8\u5206\u3002\u7576\u4ed6\u5011\u4f7f\u7528\u62b5\u6297\u8edf\u4ef6\u932f\u8aa4\u7684\u786c\u4ef6\u6642\uff0c\u4e0d\u9700\u8981\u5be6\u73fe\u9632\u7be1\u6539\u529f\u80fd\u3002\u82f1\u7279\u723e\u5df2\u5728\u5176\u67d0\u4e9b\u82af\u7247\u7d44\u4e2d\u96c6\u6210\u4e86TPM\u3002<br>. \u56fa\u4ef6TPM\u662f\u57fa\u65bc\u56fa\u4ef6\uff08\u4f8b\u5982UEFI\uff09\u7684\u89e3\u6c7a\u65b9\u6848\uff0c\u53ef\u5728CPU\u7684\u53d7\u4fe1\u4efb\u57f7\u884c\u74b0\u5883\u4e2d\u904b\u884c\u3002\u82f1\u7279\u723e\uff0cAMD\u548c\u9ad8\u901a\u5df2\u5be6\u65bd\u56fa\u4ef6TPM\u3002<br>. \u865b\u64ec\u6a5f\u7ba1\u7406\u7a0b\u5e8fTPM\u662f\u7531\u865b\u64ec\u6a5f\u7ba1\u7406\u7a0b\u5e8f\u63d0\u4f9b\u4e26\u4f9d\u8cf4\u65bc\u865b\u64ec\u6a5fTPM\uff0c\u5b83\u5011\u8655\u65bc\u9694\u96e2\u7684\u57f7\u884c\u74b0\u5883\u4e2d\uff0c\u8a72\u74b0\u5883\u5c0d\u65bc\u865b\u64ec\u6a5f\u5167\u90e8\u904b\u884c\u7684\u8edf\u4ef6\u662f\u96b1\u85cf\u7684\uff0c\u4ee5\u5f9e\u865b\u64ec\u6a5f\u4e2d\u7684\u8edf\u4ef6\u4e2d\u4fdd\u8b77\u5176\u4ee3\u78bc\u3002\u5b83\u5011\u53ef\u4ee5\u63d0\u4f9b\u8207\u56fa\u4ef6TPM\u76f8\u7576\u7684\u5b89\u5168\u7d1a\u5225\u3002<br>. \u8edf\u4ef6TPM\u662fTPM\u7684\u8edf\u4ef6\u4eff\u771f\u5668\uff0c\u5176\u904b\u884c\u65b9\u5f0f\u8207\u64cd\u4f5c\u7cfb\u7d71\u4e2d\u5e38\u898f\u7a0b\u5e8f\u7372\u5f97\u7684\u4fdd\u8b77\u4e00\u6a23\u591a\u3002\u5b83\u5011\u5b8c\u5168\u53d6\u6c7a\u65bc\u904b\u884c\u7684\u74b0\u5883\uff0c\u56e0\u6b64\u5b83\u5011\u63d0\u4f9b\u7684\u5b89\u5168\u6027\u6c92\u6709\u666e\u901a\u57f7\u884c\u74b0\u5883\u6240\u80fd\u63d0\u4f9b\u7684\u5b89\u5168\u9ad8\uff0c\u4e26\u4e14\u5bb9\u6613\u53d7\u5230\u6ef2\u900f\u5230\u666e\u901a\u57f7\u884c\u74b0\u5883\u4e2d\u7684\u81ea\u8eab\u8edf\u4ef6\u6f0f\u6d1e\u548c\u653b\u64ca\u7684\u5f71\u97ff\u3002 ]\u5b83\u5011\u5c0d\u65bc\u958b\u767c\u76ee\u7684\u5f88\u6709\u7528\u3002<\/p>\n\n\n\n<p>\u53c3\u8003<br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Hardware-based_full_disk_encryption\" target=\"_blank\" rel=\"noreferrer noopener\">\u57fa\u65bc\u786c\u4ef6\u7684\u5168\u78c1\u789f\u52a0\u5bc6<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Opal_Storage_Specification\" target=\"_blank\" rel=\"noreferrer noopener\">\u86cb\u767d\u77f3\u5b58\u5132\u898f\u7bc4<\/a><br>.&nbsp;<a href=\"https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/white-paper\/self_encrypting_drives_white_paper.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SSD\u7684\u6578\u64da\u5b89\u5168\u6027\u529f\u80fd<\/a><br>.&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/2633233\/tcg-sets-the-drive-encryption-standard.html\" target=\"_blank\" rel=\"noreferrer noopener\">TCG\u8a2d\u7f6e\u9a45\u52d5\u5668\u52a0\u5bc6\u6a19\u6e96<\/a><br>.&nbsp;<a href=\"https:\/\/www.trentonsystems.com\/blog\/self-encrypting-drives\" target=\"_blank\" rel=\"noreferrer noopener\">\u60a8\u7684\u81ea\u52a0\u5bc6\u9a45\u52d5\u5668\uff08SED\uff09\u591a\u5408\u4e00\u6307\u5357<\/a><br>.&nbsp;<a href=\"https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG_Storage-Opal_SSC_v2.01_rev1.00.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TCG\u5b58\u5132\u5b89\u5168\u5b50\u7cfb\u7d71\u985e\uff1a\u86cb\u767d\u77f3<\/a><br>.&nbsp;<a href=\"https:\/\/www.silicon-power.com\/web\/data_security\" target=\"_blank\" rel=\"noreferrer noopener\">\u7b26\u5408TCG \/ Opal 2.0\u6a19\u6e96\u7684\u81ea\u52a0\u5bc6\u9a45\u52d5\u5668\uff08SED\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/trustedcomputinggroup.org\/fundamentals-fde-comparing-top-full-disk-encryption-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">FDE\u7684\u57fa\u672c\u539f\u7406\uff1a\u6bd4\u8f03\u9802\u7d1a\u7684\u5168\u78c1\u789f\u52a0\u5bc6\u7522\u54c1<\/a><br>.&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/encrypted-hard-drive\" target=\"_blank\" rel=\"noreferrer noopener\">\u52a0\u5bc6\u786c\u76e4\u9a45\u52d5\u5668\uff08\u7b26\u5408TCG OPAL\u548cIEEE 1667\u7684\u81ea\u52a0\u5bc6\u786c\u76e4\u9a45\u52d5\u5668\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/wiki.archlinux.org\/index.php\/Self-encrypting_drives\" target=\"_blank\" rel=\"noreferrer noopener\">\u81ea\u52a0\u5bc6\u9a45\u52d5\u5668<\/a><br>.&nbsp;<a href=\"https:\/\/security.stackexchange.com\/questions\/197167\/ssd-encryption-vulnerability-tpm\" target=\"_blank\" rel=\"noreferrer noopener\">SSD\u52a0\u5bc6\u6f0f\u6d1e\u548cTPM<\/a><br>.&nbsp;<a href=\"https:\/\/www.flashmemorysummit.com\/English\/Collaterals\/Proceedings\/2012\/20120821_S103A_Thibadeau.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u8207TPM\u96c6\u6210\u7684Opal SSD<\/a><br>.&nbsp;<a href=\"https:\/\/milinda-perera.com\/pdf\/EKKLP12a.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u5e73\u53f0\u6a21\u584a\u2013\u8abf\u67e5<\/a><br>.&nbsp;<a href=\"https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/SANS-Implementing-Hardware-Roots-of-Trust.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u5be6\u73fe\u4fe1\u4efb\u7684\u786c\u4ef6\u6839\u6e90\uff1a\u53ef\u4fe1\u5e73\u53f0\u6a21\u584a\u5df2\u6210\u6642\u4ee3<\/a><br>.&nbsp;<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-1-4302-6584-9_3\" target=\"_blank\" rel=\"noreferrer noopener\">TPM 2.0\u5feb\u901f\u6559\u7a0b<\/a><br>.&nbsp;<a href=\"https:\/\/www.seagate.com\/files\/staticfiles\/support\/docs\/manual\/Interface%20manuals\/100515636c.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u4f01\u696d\u81ea\u52a0\u5bc6\u9a45\u52d5\u5668<\/a><br>.&nbsp;<a href=\"https:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/SWG_TCG_Enterprise-Introduction_Sept2010.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u4f01\u696dSED\u6f14\u793a<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a&nbsp;<a href=\"https:\/\/wentzwu.com\/2021\/03\/15\/cissp-practice-questions-20210316\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wentz Wu QOTD-20210316<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5168\u78c1\u789f\u52a0\u5bc6\uff08FDE\uff09\u53ef\u4ee5\u662f\u4fdd\u8b77\u975c\u614b\u6578\u64da\u7684\u8edf\u4ef6\u6216\u786c\u4ef6\u89e3\u6c7a\u65b9\u6848\u3002\u57fa\u65bc\u786c\u4ef6\u7684\u5168\u78c1\u789f\u52a0\u5bc6\u901a\u5e38\u7a31\u70ba\u81ea\u52a0\u5bc6\u9a45\u52d5\u5668\uff08SED\uff09 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-262","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=262"}],"version-history":[{"count":1,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/262\/revisions"}],"predecessor-version":[{"id":263,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/262\/revisions\/263"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}