Re: Vulnerability in encrypted loop device for Linux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Dec 19, 2001 at 12:25:37PM +0100, Gisle S{lensminde wrote:
> It will not solve all problems. That is teoretically impossible
> without adding redundancy.

we agree, that authentication is impossible without adding redundancy.
but i dont see why it is required to keep the same size

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/



[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux