Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

My question relates to the hardware encryption of samsungs 840 Evo SSD (maybe al

ID: 659485 • Letter: M

Question

My question relates to the hardware encryption of samsungs 840 Evo SSD (maybe also other models):

The theory: Samsung specifies that their SSD encrypts each data with AES by default. So if I choose a HDD password in my bios, I can protect my whole disk (instead of encrypting e.g. my personal data folder later). If I understood it correctly, then using this hdd password, does not change the performance of the ssd, because the encryption happens anyway (with or without the hdd password). The only difference is that I have to enter my password when the BIOS starts.

This seems a pretty good security feature, because all data are protected (protecting e.g. against thiefs) and there is no perfomance gap.

Unfortunately, I do not find any information or tests confirming samsung's claim. Is it really so simple to use? Are there disadvantages?

And by the way? What is the relation to trusted computing? To be honest, I only heard bad things about this topic.

Explanation / Answer

I can confirm that the performance of hardware encrypted drives is much better than software encryption. In fact, I find software encryption hinders performance so much, it is almost unbearable to do "heavy lifting" like using virtual machines, compiling software, etc.

The design of these drives seems basically right. They're based on the password model like TrueCrypt, rather than the TPM model like BitLocker, which is fine - as long as you use a good password.

I don't have any reason to disbelieve Samsung's claims. However, I have not personally seen any direct evidence of their encryption. To check this would need some moderately serious work, as you'd need to remove the controller board from a drive and swap it for a non-encrypting one. Well, that's what you'd do for a hard drive, I don't know if that's possible for an SSD. Anyway, it's not something I will be attempting.

These kinds of drives have nothing to do with "trusted computing". BitLocker (Microsoft's disk encryption) stores the keys in the TPM, which is related to trusted computing. Opinions on this vary, and I have no inherent objection to TPMs, but for a drive that takes a BIOS password they are irrelevant.