Re: security impact when using 256 instead of 512 aes-xts-plain key length

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



              Is there any speculation on this encryption with the new
Extension 4 file system about to enter Linux land? It seems like Extension 4
will be something people will really want to use.

On Tue, Feb 10, 2009 at 9:16 AM, unggnu <unggnu@xxxxxxxxxxxxxx> wrote:

> Hi,
>
> afaik using 256 bit key length with aes-xts-plain results in a 128 bit aes
> encryption and a 128 bit XTS key.
> 128-AES should be secure of course but what difference does the half XTS
> key make? According to Wikipedia there is a terabyte limit which might be
> lower with 128 and XTS uses two keys which might result in two 64 bit ones?
> Does anyone know which impact it have or know a good source for this? I
> haven't found any information which might be interesting for non crypto
> experts.
> 256 is faster but most likely because of the less rounds of AES-128. If
> there is no real difference like between AES-256 and AES-128 the keylength
> of 256 would make sense for slower cpus.
>
> Thanks in advance
> unggnu
>
> ---------------------------------------------------------------------
> dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
> To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
> For additional commands, e-mail: dm-crypt-help@xxxxxxxx
>
>

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux