Re: Re: why init crypto partition with random data?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Feb 23, 2007 at 10:13:15 +0000,
  Michael Schmidt <drmike@xxxxxxx> wrote:
> 
> Is anyone able to pursue this train of thoughts any further, how these known 
> plaintext attacks help breaking confidentiality of the ciphertext?

There may be other information besides the plain text that is of value to
the attacker. For example knowing the maximum amount of encrypted data
on the drive might allow them to tell whether or not some data they think
you might have is stored there.

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux