Re: Crack a dm-LUKS partition or harddisk

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The passphrase is iterated (with some sort of key derivation algorithm) as far as I understand it.

Usually you can modify the amount of time in ms during keyslot creation which is spent in doing iterations.

If you assume you can do n Iterations in 1 second, and some other machine can do 10 times n iterations, then machine two would spend (approx) 1/10 second per passphrase (password) test.

But this is only of relevance, where the passphrase universe << key universe - Meaning, when the entropy of your passphrase is bigger than the keyspace, it doesn't matter, since you'd try cracking the actualy key within the keyspace.

Regards

-Sven


Si St schrieb:
Question:
Say we have a dm/LUKS encrypted partition or harddisk. - Do we have a crack-password-delay-mechanism as a part of the encryption, or is this a feature of the software of the OS?

I I have understood that with the very rapid crackingspeed (brute-force) we have nowadays, the new approach to this is to force in a delay for each password enter, as a tool of increased security. Is this feature a block independent software, or is it only a software program of the booted OS?

If so, attacking the harddisk directly independent of the booted OS will pass this feature.

(Have I made myself clear?)


_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux