Jari Ruusu wrote: > Userland encrypted swap and random key (file system) setup: > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > 40 KB of old encrypted data is read from disk, and hashed with SHA-512. That > same 40 KB of old encrypted data is then overwritten 20 times using random > data generated from computed hash and time stamp. 32 bytes of common random > data is read from /dev/urandom. For each 65 keys, 16 bytes of per key random > data is read from /dev/urandom. Each of 65 random keys is generated by > hashing "40 KB of old encrypted data" and 32 bytes of common random data and > 16 bytes of per key random data using SHA-512. Correction to above. Last sentence should read as: Each of 65 random keys is generated by hashing hash of "40 KB of old ^^^^^^^ encrypted data" and 32 bytes of common random data and 16 bytes of per key random data using SHA-512. -- Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/