Hi, On Sun, Sep 10, 2006 at 09:38:02AM +0200, Clemens Fruhwirth wrote: > http://clemens.endorphin.org/publications - New Methods in Hard Disk > Encryption > > Chapter 5.3 - Passwords from entropy weak sources. > Chapter 5.3.3 - Numbers. Thanks for the pointers! I don't think I completely understand all of the maths involved, but I think I'll just use the more conservative options (-s 256 and -i 5000 or -i 10000 or something); it doesn't impose any dramatical performance loss, and I sleep better when there is some slight chance that in case problems become apparent (such as with MD5 or SHA-1) I still have _some_ "safety margin" in terms of sheer effort needed to break the crypto. Cheers, Uwe. -- Uwe Hermann http://www.hermann-uwe.de http://www.it-services-uh.de | http://www.crazy-hacks.org http://www.holsham-traders.de | http://www.unmaintained-free-software.org
Attachment:
signature.asc
Description: Digital signature