CPT 499C lecture 14 EFS

CPT 499C lecture 14 EFS - DEPARTMENT OF COMPUTER &...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
EFS Slide 1 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY Encrypting File System
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
EFS Slide 2 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY Encrypting File System Students will be able to: Describe the EFS encryption process Identify and document the individuals that can decrypt an EFS encrypted file Describe strategies for decrypting EFS encrypted files
Background image of page 2
EFS Slide 3 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY Encrypting File System Introduced with Windows 2000 Works only on NTFS drives Can Encrypt: Individual files All the files in a subdirectory Only encrypts the contents of the data stream(s) Does not encrypt the file names
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
EFS Slide 4 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY Encrypting File System Can not encrypt System files Files in systemroot and its subdirectories NTFS Compressed files
Background image of page 4
EFS Slide 5 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY Recovery Agent Required for Windows 2000 Default is Administrator of local computer or domain Optional for Windows XP No default recovery agent Windows 2000 and XP support multiple recovery agents
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
EFS Slide 6 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY How does EFS work?
Background image of page 6
EFS Slide 7 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY Encrypting File System First the data is encrypted with a unique, random generated File Encryption Key (FEK) Single key or Symmetric encryption DESX Currently used at 128 bit 3DES available for Windows XP New FEK generated for each file
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
EFS Slide 8 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY DESX Encryption Plaintext DESX software FEK Encrypted file Plaintext FEK Encrypted file DESX software The same key is used to encrypt and decrypt the data Must be same FEK! START START END END
Background image of page 8
EFS Slide 9 DEPARTMENT OF COMPUTER & INFORMATION TECHNOLOGY Plaintext DESX software FEK Encrypted file Plaintext FEK Encrypted file DESX software START START END END So, what would it take to beat this system?
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 32

CPT 499C lecture 14 EFS - DEPARTMENT OF COMPUTER &...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online