Method for altering the access characteristics of encrypted data
A technology for user data area and data, which is applied in the field of access characteristics and systems for changing encrypted data, and can solve problems such as encryption key management that cannot be solved.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] A method, system and program are disclosed by storing one or more Encrypted Encapsulated Data Keys (or Externally Encrypted Data Keys) (EEDKs) in a user data area on a magnetic tape cartridge to effectively control or alter access to removable media such as magnetic Access to encrypted data in storage media. For example, when data is to be encrypted and stored on a removable storage medium, the data is encrypted using a data key, such as by performing AES encryption using a randomly generated 256-bit data key. The data can then be encrypted with a different encryption key (also called a key encryption key), such as by using public key cryptography techniques such as Rivest, Shamir and Adleman (RSA) or elliptic curve cryptography (ECC). Encryption or wrapping is performed to generate the EEDK, and the EEDK may be stored in one or more locations outside the user data area. By encrypting the data key with an encryption key to form an EEDK and then storing the EEDK to one...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 