(AES) loopback crypto questions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



1) if an attacker has got some files which are on an (AES) encrypted device,
will he be able to decrypt the whole device?

2) is it a good idea to run "cat /dev/zero > zero.file; shred -uv zero.file"
on (AES) encrypted devices to overwrite all free space with random data [to
remove any encrypted data which is left from deleted files from the device
behind the loopback device and confuse attackers]?

the brackets in "(AES)" mean that i'd like to know if the answer applies to
AES only or also other cyphers (i guess so?)



Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux