Re: Re: Loop-AES and Twofish on 64-bit CPU

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> -------- Original-Nachricht --------
> Datum: Fri, 26 May 2006 02:17:07 +0100 (BST)
> Von: Christian Kujau <evil@xxxxxxxxxx>
> An: linux-crypto@xxxxxxxxxxxx
> Betreff: Re: Loop-AES and Twofish on 64-bit CPU
> 
> On Tue, 9 May 2006, Gisle Sælensminde wrote:
> > First I would like to mention that this is not likely to increase the 
> > security in any way.
> 
> Wy not?

Thanks a lot for bailing me out:-) I did not know what to answer to Gisle Sælensminde. The outlook that a double layer of loop-aes could decrease security is rather shocking.
My questions and proposals never dealt with cipher analysis. I rather concentrate on things like a proper & easy to handle environment. Storing keys and tools on a usb-stick has nothing to do with strong ciphers but it is the ultimate opportunity to keep keys away from your attackers *and* encrypt all your data, not just larger parts.
As all ciphers can and will be broken I deem it important to look for alternatives on how to cover encryption. Where could the data be on a drive with no partition table? Where to start a brute force attack if there is no  end and no beginning? Is it a successfull attack if you get encrypted data after you break the first layer of encryption?
I suppose and fear popular tools like truecrypt rely to much on buzzword compliant selfpromotion.
I still suppose double encryption and mixing up more than one cipher in deed does slow down attackers.

Regards,
Peter

-- 


Bis zu 70% Ihrer Onlinekosten sparen: GMX SmartSurfer!
      Kostenlos downloaden: http://www.gmx.net/de/go/smartsurfer
    

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux