About SSD AES-encryption

Self-encrypting drives use an encryption engine built into the SSD’s controller to encrypt every file stored on the drive. The purpose of AES Encryption is to convert standard input data known as plaintext to an unintelligible output known as cipher text.

So if AES encryption on SSD used for data randomization function only, it only provides some data protection in the sense that if the controller is damaged, a 3rd party would not be able to read the data on the flash. In normal usage, however, there would be no data protection as any party that is in possession of the drive can read the data.

Methods of using AES on SSD to Secure Data

Hardware-based Encryption
Self-encrypting drives include dedicated AES encryption engines that do not require software to run on the host. The randomized AES encryption keys are generated at product initialization using the controller’s true random number generator and encrypted in the SSD. This could also be implemented by a Trusted Platform Module (TPM) chip build into the system hardware. Then the users can enable the AES encryption through BIOS. If authorized, the BIOS would access a secure data storage location that contains the encryption keys. The BIOS would then write the keys to their specific SSD to enable access.

ATA Security
If supported, the user could through ATA security using system BIOS. Setting the ATA password will set the authentication key and enable authentication on an encrypted SSD.

Self-designed Tool
If the user cannot program ATA command themselves, we also can provide a tool based on user’s OS (Windows or Linux) for them to implement encryption.


To learn more Renice's SSD AES encryption, please email us at sales@renice-tech.com

Comments

Popular posts from this blog

Renice r-Backup® Power Failure Protection of SSD

How to extend SSD life expectancy by 3 folds? Renice Non-Balance Wear Leveling Algorithm