-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, After reading a lot I found out that there are still known weaknesses in loop-aes, although multi-v3-key mode should reduce the risk of some of these. Refering to http://clemens.endorphin.org/nmihde/nmihde-A4-os.pdf, there seem to be remarkable attack possibilities because of the weaknesses of CBC scheme in general. (see chapter 4 of the PDF) Are you planing to change loop-aes implementation to support also this new LRW patch or something that prevents these kind of attacks? Personally, I'd prefer if I could use this software because I think the developers know more about the stuff than some other people.. The best thing though would be if you develop together with the luks/dm-crypt people and create something even better than both of you could develop alone :) Hope to get a reply soon :) Chris -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFDSlKAJQIKXnJyDxURAjB3AJwL78JU/C7+t5SI2qGgfri0OVxKHgCgmEtx PEkMIhjO3dawGvO4pteYk1k= =SCyD -----END PGP SIGNATURE----- - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/