Mr. Ruusu: So a 256-bit (or greater) hash adds an immense level of power to the pass phrase then! Very Respectfully, Stuart Blake Tener, IT3, USNR-R, N3GWG Beverly Hills, California VTU 1904G (Volunteer Training Unit) stuart@xxxxxxxxxxx west coast: (310)-358-0202 P.O. Box 16043, Beverly Hills, CA 90209-2043 east coast: (215)-338-6005 P.O. Box 45859, Philadelphia, PA 19149-5859 Telecopier: (419)-715-6073 fax to email gateway via www.efax.com (it's free!) JOIN THE US NAVY RESERVE, SERVE YOUR COUNTRY, AND BENEFIT FROM IT ALL. Sunday, September 30, 2001 2:21 PM -----Original Message----- From: root@xxxxxxxxxxxxxxxxx [mailto:root@xxxxxxxxxxxxxxxxx]On Behalf Of Jari Ruusu Sent: Sunday, September 30, 2001 1:38 PM To: stuart@xxxxxxxxxxx Cc: peter k.; linux-crypto@xxxxxxxxxxxx Subject: Re: Announce loop-AES-v1.4e file/swap crypto package "IT3 Stuart B. Tener, USNR-R" wrote: > So if I understand you correctly, it is the "seed" which is allowing us to > choose our own less secure phrases, and the seed makes it that much tougher? > So buy using the longest "bitwise" seed we can, we are more able to feel > comfortable with lower entropy phrases? Seed prevents an attacker from precomputing hashes of every dictionary string he has in _advance_. Seed _slows_ down dictionary attack as an attacker would have to recompute the hashes for each different seed, and he can't even start doing that until he knows your seed. Regards, Jari Ruusu <jari.ruusu@xxxxxxxxxx> Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/