Implementation Exceptions - Western Digital Ultrastar DC HC310 Specifications

3.5 inch serial ata hard disk drive
Table of Contents

Advertisement

 [SP800-131A] Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key
Lengths, NIST, 2011 Jan
 [SP800-132] Recommendation for Password-Based Key Derivation, NIST, 2010 December
9.21.1.4
Department of Defense
DoD 5220.22-M, "National Industrial Security Program Operating Manual", 2/28/2006
http://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodm/522022M.pdf
9.21.1.5
RSA Laboratories Standards
1. RSA-PSS -
https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf
2. RSA PKCS #5 v2.0 Password-Based Cryptography Standard -
https://www.emc.com/collateral/white-papers/h11302-pkcs5v2-1-password-based-cryptography-standar
d-wp.pdf
9.21.2

Implementation Exceptions

The following is a list that describes non-compliance with the TCG Enterprise SSC specification:
 The SSC specification requires support for 1023 bands, but the implementation supports up to 15 bands.
 The K_AES_256 table was implemented with only the UID and MODE columns.
 Only one active session is permitted at a time. If a new session is requested when a session is already active,
the drive answers the host with SP_BUSY, instead of NO_SESSIONS_AVAILABLE
9.21.3
Implementation Features and Details Outside of TCG
Specifications
The following features are outside of the TCG specifications.
1. Ports
2. Firmware signing
The following implementation details are outside of the TCG Enterprise SSC specification.
a. The SSC Specification states "The TPer SHALL implement the ParamCheck Longitudinal Redundancy Check
(LRC) for Get and Set method calls on a PIN value". If the LRC check is erroneously applied to a value other
than a PIN we ignore it, therefore no error is generated.
b. When handling a "TCG cmd followed by a R/W cmd", all reads and writes that follow a TCG command will be
processed in the normal way. No special handling or error messages will be sent to the host. It is up to the
host to understand the possible outcomes of TCG commands and r/w command ordering and plan accordingly.
c. CRC checking is disabled in all cases, so the drive will return data to the host. If the user successfully
authenticates, then unencrypted data is returned to the host. If the user is unable to authenticate, encrypted
data is returned to the host.
d. The TPer replies with SP_BUSY for requests beyond 1 session.
e. TCG Life Cycle Model by Activate Method and Revert Method was implemented by according to Opal SSC
Western Digital Hard Disk Drive OEM Specification
100

Advertisement

Table of Contents
loading

Table of Contents