Re: Valid ciphers and modes for dmcrypt?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks roscoe,

I had somewhat of an understanding of the way luks generates the master key,
although your description has filled in a number of blanks.

The thing I'm still not understanding is why the master key needs salting +
iteration; for a password/phrase this makes perfect sense, but I was under the
impression that the master key is derived from /dev/random (or /dev/urandom ?)
and that salting and iterating it may actually reduce it's entropy therefore
making it _less_ impervious to attack.

As you mention you are not a cryptographer (neither am I) can anyone here
comment on the merits of this approach with an input key that is already very
high in entropy?





---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux