Re: loop-AES cryptoloop interop

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



"Hannes R. Boehm" wrote:
> Why can't I read cryptoloop devices with loop-AES (and the other way round)
[snip]
> I can neither read cryptoloop devices with loop-AES nor loop-AES devices with cryptoapi.
> Both use AES256 encryption with the same plaintext password. If I am right, they
> use both the same plaintext to key funciton and both use 512 byte blocksize.

When you are using loop-AES, and specify "-H rmd160" option to losetup, or
"-o phash=rmd160" option to mount, losetup and mount programs use RIPE-MD160
to hash your password, and as such is 100% compatible with cryptoapi
512-byte-IV versions.

> Can I decrypt loop-XY with any other AES implementation like this ?
> cat /dev/hdc99 | ase-generic -d > file

At least this will create unencrypted version of your filesystem.

    losetup -e AES256 /dev/loop0 /dev/hdc99
    dd if=/dev/loop0 of=file bs=64k
    losetup -d /dev/loop0

> is there another way to decrypt without the use of neither loop-AES/cryptoloop
> (only using the function to extract the key from the plaintext)

Yes. 50 lines of C code linked with AES and hash-function libraries should
do be able to do it.

Regards,
Jari Ruusu <jari.ruusu@pp.inet.fi>
-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/



[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux