why init crypto partition with random data?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

the on-line LUKS documentation recommends for crypto-analytic reasons to 
initialize any partition that is to becom encrypted by LUKS to be initialized 
with random data (from: http://www.saout.de/tikiwiki/tiki-index.php?
page=EncryptedDeviceUsingLUKS):

Note : if you want your encryption to defeat a full cryptoanalytic attack, not 
just casual snooping, you need to fill the disk with high quality random data. 
Badblocks below justs uses 'libc' random(), but is fast (your limitation will 
be disk speed, not CPU speed). /dev/urandom is better (takes about 5 minutes 
per gigabyte on my system), /dev/random is best (takes about 1 year per 
gigabyte on my system, much too slow!).


What's the very reason for it (besides eliminating any left-over plaintext 
data)? Is there any scientific papaer or reference backing this up?


Thanks in advance,

Michael



---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux