Re: Loop-AES and Twofish on 64-bit CPU

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jari Ruusu wrote:
> Userland encrypted swap and random key (file system) setup:
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 40 KB of old encrypted data is read from disk, and hashed with SHA-512. That
> same 40 KB of old encrypted data is then overwritten 20 times using random
> data generated from computed hash and time stamp. 32 bytes of common random
> data is read from /dev/urandom. For each 65 keys, 16 bytes of per key random
> data is read from /dev/urandom. Each of 65 random keys is generated by
> hashing "40 KB of old encrypted data" and 32 bytes of common random data and
> 16 bytes of per key random data using SHA-512.

Correction to above. Last sentence should read as:

Each of 65 random keys is generated by hashing hash of "40 KB of old
                                               ^^^^^^^
encrypted data" and 32 bytes of common random data and 16 bytes of per key
random data using SHA-512.

-- 
Jari Ruusu  1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9  DB 1D EB E3 24 0E A9 DD

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux