This paper concisely summarizes the XTS block encryption mode for storage sector-based encryption applications and clarifies its limitations. In particular, we aim to provide a unified basis for constructive discussions about the newly introduced key scope change to the IEEE 1619 standard. We also reflect on wide modes that could replace XTS in the future.
This paper provides a concise summary of the XTS block cipher mode employed in sector-based storage encryption applications and elucidates its limitations. Specifically, the paper aims to establish a unified discussion foundation regarding the key scope modifications newly introduced in the IEEE 1619 standard. The article further reflects on potential wide-block cipher modes that may supersede XTS in the future.
Standardization Dilemma: Since the introduction of XTS mode in 2007, it has been widely adopted by BitLocker, VeraCrypt, Cryptsetup, and TCG Opal, yet numerous misconceptions and controversies persist regarding the mode
Documentation Accessibility Issue: The existing NIST XTS-AES recommendation only references the paid version of the IEEE standard, making it the sole NIST cryptographic primitive without publicly available documentation
Compliance Crisis: The key scope modifications newly introduced in the IEEE 1619-2025 standard will render the vast majority of existing implementations non-compliant, forcing vendors to undertake substantial modifications
Unified Terminology: Provide theoreticians and practitioners with easily comprehensible unified definitions of XTS terminology
Clarify Controversies: Explicitly delineate the security limitations of XTS, particularly regarding key scopes, maximum sector sizes, and distinct key requirements
Facilitate Discussion: Encourage open constructive dialogue to influence future requirements and recommendations
This paper revisits the XTS (XEX-based tweaked-codebook mode with ciphertext stealing) block cipher mode for sector-based storage device encryption, where the input is plaintext sector data and the output is ciphertext data of identical length.
XTS, like other traditional modes (ECB, CBC, etc.), cannot provide complete diffusion (where each ciphertext bit depends on each plaintext bit) when encrypting data exceeding several blocks.
Overall Assessment: This is a timely and important paper that systematically analyzes the current state and future development of XTS mode. The paper not only clarifies technical details but, more importantly, proposes a constructive discussion framework that holds significant importance for promoting the healthy development of storage encryption standards.