> -------- Original-Nachricht -------- > Datum: Fri, 26 May 2006 02:17:07 +0100 (BST) > Von: Christian Kujau <evil@xxxxxxxxxx> > An: linux-crypto@xxxxxxxxxxxx > Betreff: Re: Loop-AES and Twofish on 64-bit CPU > > On Tue, 9 May 2006, Gisle Sælensminde wrote: > > First I would like to mention that this is not likely to increase the > > security in any way. > > Wy not? Thanks a lot for bailing me out:-) I did not know what to answer to Gisle Sælensminde. The outlook that a double layer of loop-aes could decrease security is rather shocking. My questions and proposals never dealt with cipher analysis. I rather concentrate on things like a proper & easy to handle environment. Storing keys and tools on a usb-stick has nothing to do with strong ciphers but it is the ultimate opportunity to keep keys away from your attackers *and* encrypt all your data, not just larger parts. As all ciphers can and will be broken I deem it important to look for alternatives on how to cover encryption. Where could the data be on a drive with no partition table? Where to start a brute force attack if there is no end and no beginning? Is it a successfull attack if you get encrypted data after you break the first layer of encryption? I suppose and fear popular tools like truecrypt rely to much on buzzword compliant selfpromotion. I still suppose double encryption and mixing up more than one cipher in deed does slow down attackers. Regards, Peter -- Bis zu 70% Ihrer Onlinekosten sparen: GMX SmartSurfer! Kostenlos downloaden: http://www.gmx.net/de/go/smartsurfer - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/