IEEE Std 1619:2018 pdf download.lEEE Standard for Cryptographic Protection of Data on Block- Oriented Storage Devices.
IEEE Std 1619 specifies the XTS cryptographic mode of operation for the Advanced Encryption Standard modes (AES) block cipher for block-oriented storage devices.
1.2 Purpose
The purpose of this standard is to define the XTS cryptographic mode while maintaining backward compatibility with existing implementations that are compliant with IEEE Std 1619w- 2007 [B5].
2. Normative references
The following referenced documents are indispensable for the application of this document (i.e., they must be understood and used, so each referenced document is cited in text and its relationship to this document is explained). For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments or corrigenda) applies.
NIST FIPS-197, Federal Information Processing Standard (FIPS) for the Advanced Encryption Standard (AES).
3. Definitions, acronyms, and abbreviations
3.1 Definitions
For the purposes of this document, the following terms and definitions apply. The IEEE Standards Dictionary Online should be consulted for terms not defined in this clause.
key scope: Data encrypted by a particular key, divided into equal-sized data units. The key scope is identified by three nonnegative integers: tweak value corresponding to the first data unit, the data unit size, and the length of the data.
NOTE—A key scope would normally apply to more than one data unit (see 4.3); however, it is possible to define a key scope that corresponds to one data unit.
tweak value: The 128-b value used to represent the logical position of the data being encrypted or decrypted with XTS-AES.
3.2 Acronyms and abbreviations
AES Advanced Encryption Standard
CBC cipher block chaining
CTR counter
FIPS Federal Information Processing Standard
GF Galois field (see Menezes, Qorshot, and Vanstone [58])
LBA logical block address
XTS XEX encryption mode with tweak and ciphertext stealing
4. Numerical values, letter symbols, and special term
4.1 Numerical values
This standard uses decimal, binary, and hexadecimal numbers. For clarity, decimal numbers generally
represent counts, and binary or hexadecimal numbers describe bit patterns or raw binary data. Decimal numbers are represented in their usual 0, 1, 2, ... format. Binary numbers are represented by a string of one or more bits followed by the subscript 2. Thus, the decimal number 26 may also be represented as 000110102. Hexadecimal numbers are represented by a string of one or more hexadecimal characters followed by a subscript 16.
4.2 Letter symbols
The following symbols are used in equations and figures.IEEE Std 1619 pdf download.