Re: Random fill

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> At Mon, 31 Aug 2009 06:50:39 -0400,
> test532@xxxxxxxxxxxxxxxx wrote:
> 
> Thanks for your polite explaining so far!
> 
> > Because the point of filling with random data is to eliminate the
> > possibility of being able to tell where real data is stored.
> 
> Yes, that's clear.
> 
> > If the random data is cracked by using a known plaintext attack, then the
> > benefit of having this random data is nullified.
> 
> To crack the random data, the attacker must be able to distinguish them
>  from the "real" data. AS far as I know, if the key after a nullifiying
>  action via dmcrypt is wiped, the disk is filled with pseudorandom data and
>  ciphertext of the real data. For a known plaintext attack to work, one
>  must have the plaintext and the corresponding block of ciphertext
>  resulting in encryting this plaintext, ...

The truth in what you say above does make it difficult, but the amount of 
difficulty depends on how full the drive is. On a mostly empty drive, the 
probability of guessing correctly where the plain text equals zeros is fairly 
high. The further from mostly empty the drive becomes, the less likely success 
becomes.

> but that is not possible in this
>  scenario. No one can distinguish between the real ciphertext (encrypted by
>  a wholly different key) and the filling with zeroes.

> 
> The aim of a known plaintext attack is to find the key, but it has been
> irrevocably wiped, and the real text is encrypted by a totally different
>  key, in fact.
> 
> Sorry, but I can not see at all how a procedure which uses /dev/zero and
> dmcrypt to fill a partition with pseudorandom data could weaken the whole
> encryption / reduce the time for an attack on the real ciphertext at all.
> 

> Besides, AES is not vulnerable to known plaintext attacks, as far as I
>  know.

As far as you or I know. But I can guarantee you that someone out there knows 
more and isn't saying. How much more? I don't want to bet my data on it.

My operating system as it is right now has no vulnerabilities in it that I 
know of. That doesn't mean that I am going to turn off SELinux on the machine, 
because I know there is at least a possibility of vulnerabilities, and that is 
enough reason to take any extra precautions that are reasonable.

Sam

> 
> 
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> http://www.saout.de/mailman/listinfo/dm-crypt
> 
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux