Follow us:
 
 

Products and Services

X-Wall Cryptographic IC
X-Wall MX+
X-Wall DX
X-Wall FX
X-Wall MX
X-Wall CO
X-Wall XO
X-Wall LX
X-Wall SE
System Product
Enigma 1
Enigma 2
Cipher Drive SC
SecureRAID 1U
SecureNAS
Hawk-IIc Key Management
Industrial ODM design
Industrial ODM design

PR Contact:

Company Contact:
Address:
1st Floor, No. 11, Research & Development 2nd Road, Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China
TEL: +886 3 577 2767
FAX: +886 3 577 2770

Sales & Marketing,
please contact:
[email protected]
Others, please contact:
[email protected]

Font size:

Hawk-IIc Key Management

Resources

Datasheet FAQ Presentations Product Brief
Utility White Papers Reports (Test Report,
Compatibilty Report)
Send us query
Development board Awards User's Manual  

ALWAYS SHELF THE OTHER AVAILABLE KEY TOKEN TO A SAFE REPOSITORY!!!

Product Overview

Your X-Wall product is specifically engineered to encrypt/decrypt the entire disk drive bit-by-bit real-time including boot sector and operating system. It does NOT need special device driver support, making it completely independent from all operating systems. Your privacy, confidentiality and valuable information assets on the disk drive are safely guarded via a NIST (National Institute of Standards & Technology) and CSE (Communication Security Establishment) certified DES, TDES (Triple DES) and AES algorithms. Though the chips are engineered to be 100% compatible with all IDE disk drives, there maybe occasions that various system configurations may cause difficulties in installation, which maybe referenced to Q&A for possible problem solving.

Especially noted is that your product comes with a pair of portable Secure KEY (key token) (key token) used for authentication and operation of the X-Wall cryptographic engine. Without the presence of the enclosed key tokens, your computer will NOT be able to boot (if you choose the intended disk drive as the Primary Master); or the data on the disk drive will NOT be seen (if you choose the intended disk drive as the Slave). As the "Secret Key" of the X-Wall real-time cryptographic engine is stored in the key token, it's extremely important that you always maintain one key token accessible while shelf the other to a safe repository. The decryption process relies solely on the Secret Key, which is stored inside the key token. Losing both tokens will make your daily computing life so miserable as the recovery of encrypted data is EXTREMELY hard without the right Secret Key.

ALWAYS SHELF THE OTHER AVAILABLE KEY TOKEN TO A SAFE REPOSITORY!!!

It is natural for you to assume that we at Enova® Technology might have a duplicate of the random database such that recovery of the key token should not be a concern. You would be wrong if you've made such a bold assumption. It is the company policy that we destroy the random database after it is written into the key token. There isn't any duplication of the random database within the company's premise.

IT'S THE COMPANY POLICY THAT WE DESTROY THE RANDOM DATABASE AFTER IT IS WRITTEN INTO THE KEY TOKEN. WE DO NOT KEEP THE DUPLICATES AND NO ONE IN THIS WORLD OTHER THAN YOU HAS THE DUPLICATES.

Key Benefits
1. Which stores the "Secret Key" values required for the operational X-Wall cryptographical engine. The Secret Key is a random combination of digitized bit of "0" and "1" in a specified length such as 40, 64, 128 or 192-bit, depending on the X-Wall chip strength..
   
2. Depends on the encryption strength you have chosen, a DES 40-bit encryption maybe a bit easier to decrypt. A DES 64-bit encryption is extremely hard to decrypt and the process will consume lots of time and money. The decryption of TDES 128 and/or 192-bit without the right Secret Key is physically impossible.
   
3. It is used to write the formatted Secret Key value to every key token.
 
Services for distribution/channel/corporate partners


Lost Keys?

The Hawk-IIc hardware programmer unit has two standard Enova® specific key receptacles which allow users to generate, duplicate, and distribute key tokens. It can be working without a host PC connected to it (Stand Alone Mode) or with a host PC (Host Mode) via USB interface. Figure shown below is the Hawk-IIc hardware programmer unit.


About Hawk-IIc hardware programmer unit

So what will happen if you or your customers lose all available key tokens? Try our new Hawk-IIc Key Management Platform to generate, duplicate, recover and distribute key tokens. The Hawk-IIc Key Management Platform is specifically engineered to facilitate flexible key management. Through its light weight, compact form factor design and economic price tag, the service of key token can be easily managed. To obtain a copy of user's guide of Hawk-IIc Key Management Platform please contact your authorized Enova® Technology representatives.


Chick here to enlarge
What does the Platform consist of?

The Hawk-IIc Key Management Platform consists of the following critical elements:

1. Software installation CD ROM 1
2. Hawk-IIc hardware programmer unit; 1
3. USB Cable 1
4. Power cord 1
5. This User's Guide 1
6. Enova® specific key token (empty) 10
7. Enova® Random Number Generator Suite 1(optional, please refer to Note 1)
Note 1:
  The Enova® Random Number Generator Suite that contains programs for random key codes generation, formatting, and testing for randomness according to FIPS 140-2 randomness test, can be licensed. Use of this Suite is subject to Enova® Technology's terms and conditions as spelled out in License Agreement for which you may contact Enova® Technology ([email protected]) or authorized distributor for details. Without this Suite, Hawk-IIc hardware programmer unit can only be used to dubplicate and maintain existing key tokens.

Figure below illustrates Hawk-IIc Key Management Platform content.

Don't like the Secure Key?

We understand you might have preference over using other authentication devices for authentication. Attempt to replace the external key token is possible with some level of system engineering efforts. Please note, the current X-Wall SE/LX version has a hardwired interface which communicates directly to the external key token upon boot up. One can easily emulate the interface (protocol) such that BIOS PIN/Password and/or any other third party authentication device makers such as Smartcard or Fingerprint can function with X-Wall SE/LX to replace the external key token. Please contact us for an in depth engineering architecture.

 

© Copyright 2012 Enova Technology Corporation. All Rights Reserved.
Chick here to enlarge