Re: Embedding keys and vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



* Phil <philtickle200@xxxxxxxxx> wrote:

> So, my question is this: could an attacker looking at a partition
> encrypted in this way (which appears random), but knowing that at
> so-many bytes from the beginning there might be a loop-aes
> encrypted gpg key which will either have the loop-aes encrypted
> acii plaintext string above or loop-aes encrypted gpg binary
> headers, use this knowledge to crack the first (top) layer of
> encryption?

Well, there is a filesystem of your choice on that partition anyway
and its structure is known. Given that there are only so much
filesystems you can put to use you already have a known plaintext
issue of some sort. Same stuff applies for widely-used binaries,
document formats / headers etc.

In short, nope.

-- 
left blank, right bald

Attachment: pgpeWICxcLYcv.pgp
Description: PGP signature


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux