We want to implement a drive controller that includes persistent key storage to store-wrapped keys. The design is based on the controller diagram shown in Figure 9.20.
a. Redraw Figure 9.20 to include the persistent key storage and any other components required for wrapped keys. Include all data paths necessary to support wrapped keys. Be sure to mark paths to indicate if they carry commands, data, or keys. Clearly indicate the security boundary to show which components reside inside and outside the boundary.
b. Using the components in your diagram, give a step-by-step description of drive unlocking.
c. Is the persistent key storage inside or outside the security boundary? Why?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here