I have been searching the lists for any hints concerning the high probability of brute-force-attaccks aginst the password of an encrypted filesystem, but did not find much. Did any thoughts about this go into the planning of cryptoapi/loop or loop-AES? As computing power will increase, this topic will be of more and more relevance for any encryption-software that uses one and the same key. There is the -S option in loop-AES, which aims to slow down dictionary attacks. Does this mean the computation time for one guess inreases? many thanks, Gerhard - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/