Stepping back for a moment, here are some basic questions about the above mentioned paper and slides...
*******
https://www.cl.cam.ac.uk/~osc22/docs/slides_fv2_ifip_2013.pdfSlide 17
Q1.) What exactly is a GPT header and what does it do?
Q2.) Are Core Storage and HFS Plus "volumes"?
Q2b.) Are there any other "volumes" on a Mac hard-drive?
*******
https://eprint.iacr.org/2012/374.pdf
Page 8
3.6 Full disk encryption and decryption
My understanding is that FileVault2 uses two AES keys:
key1 - volume key
key2 - tweak key
On Slide 17 of https://www.cl.cam.ac.uk/~osc22/docs/slides_fv2_ifip_2013.pdf, it looks like "AES Key 1" is involved...
Q3.) Which "key" is the author talking about? Volume key? Tweak key? Other?
Q4.) Also, if the CoreStorage volume is completely encrypted, then how can AES Key1 be read?
Q5.) And if the AES Key1 is *not* encrypted on the CoreStorage volume header, then doesn't the defeat the purpose of having a key in the first place? (I assume all keys should be private.)
Hopefully those questions make sense...
*******
https://www.cl.cam.ac.uk/~osc22/docs/slides_fv2_ifip_2013.pdfSlide 17
Q1.) What exactly is a GPT header and what does it do?
Q2.) Are Core Storage and HFS Plus "volumes"?
Q2b.) Are there any other "volumes" on a Mac hard-drive?
*******
https://eprint.iacr.org/2012/374.pdf
Page 8
3.6 Full disk encryption and decryption
Now that we have presented the building blocks of FileVault 2 we can describe the entire volume decryption process, as depicted in figure 8. Firstly we need to decrypt the EncryptedRoot.plist file using the key from the volume header.
My understanding is that FileVault2 uses two AES keys:
key1 - volume key
key2 - tweak key
On Slide 17 of https://www.cl.cam.ac.uk/~osc22/docs/slides_fv2_ifip_2013.pdf, it looks like "AES Key 1" is involved...
Q3.) Which "key" is the author talking about? Volume key? Tweak key? Other?
Q4.) Also, if the CoreStorage volume is completely encrypted, then how can AES Key1 be read?
Q5.) And if the AES Key1 is *not* encrypted on the CoreStorage volume header, then doesn't the defeat the purpose of having a key in the first place? (I assume all keys should be private.)
Hopefully those questions make sense...