Re: Re: SMP-aware kcryptd?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Afaik all known modes of operation, are somewhat a 'basis' to the XTS mode, which prevents certain attacks found in LRW and other CBC modes. The only mode I can think of currently which might not be prone to this, is (probably) CMC/EME. Or, if you look differently at it: if XTS fixes most issues of other CBC modes of operation and is still prone to this type of statistical attack, you would most crtainly want to consider to have as many different keys as possible, for large amounts of data.
(This is a simple type of reduction).
And (this should be ovious to everyone): The more data you encrypt with a single key, the bigger chances are, to break the encryption.

Regards

-Sven

P.S.:http://en.wikipedia.org/wiki/Disk_encryption_theory gives small ovrview of different modes of operation and possible attacks and how XTS relates to the other modes of operation.


Michael Gebetsroither schrieb:
* Sven Eschenberg <sven@xxxxxxxxxxxxxxxxxxxxx> wrote:
Aside from the fact, that SMP support would not do any harm, you should consider this: Volumes >> 1TB have certain weaknesses - this is pretty much true for all block chaining enrcyption schemas.

Do you have any facts on this which is "pretty much true for all block
chaining encryption schemas"?

I know of problems only for XTS. Whic has weaknesses when you come into
the TB to PB range.

michael

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux