loop-aes and known weaknesses

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

After reading a lot I found out that there are still known weaknesses
in loop-aes, although multi-v3-key mode should reduce the risk of some
of these.

Refering to http://clemens.endorphin.org/nmihde/nmihde-A4-os.pdf,
there seem to be remarkable attack possibilities because of the
weaknesses of CBC scheme in general. (see chapter 4 of the PDF)


Are you planing to change loop-aes implementation to support also this
new LRW patch or something that prevents these kind of attacks?
Personally, I'd prefer if I could use this software because I think
the developers know more about the stuff than some other people.. The
best thing though would be if you develop together with the
luks/dm-crypt people and create something even better than both of you
could develop alone :)

Hope to get a reply soon :)

Chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFDSlKAJQIKXnJyDxURAjB3AJwL78JU/C7+t5SI2qGgfri0OVxKHgCgmEtx
PEkMIhjO3dawGvO4pteYk1k=
=SCyD
-----END PGP SIGNATURE-----


-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux