On 19/09/2011 18:00, Karl O. Pinc wrote : > On 09/19/2011 10:45:52 AM, Robbie Smith wrote: > >> How much of a load on the system would LUKS + LVM be? Is it >> likely to result in a noticeable drop in performance? > > It all depends, but generally no because cpu is _so_ much > faster than disk these days. Indeed, you won't notice it on a modern computer, especially for every day use. It may be painful for data transfer from one encrypted disk to another encrypted disk, but you can expect very good rates anyway. It depends on the cipher you use, on your machine, ... >> Does entering the key(s) at boot decrypt the whole volume, >> or just provide a means for the kernel module >> to decrypt and encrypt on-the-fly? > > The latter. > >> And… how does it work? The documentation makes mention of multiple >> key-slots; but I'm a little baffled as to how different keys can be >> used to decrypt the same volume. It is based on symmetric >> cryptography isn't it? > > Yes, but the master key is encrypted by each key, separately, and > that's what your multiple passwords decrypt. > > See the tks-1 paper (iirc) referenced on the wiki for more info. This is important as it means your disk encryption is basically as strong as your "weaker key slot". e.g. a very bad password for one key slot make all other passwords/keys inefficient. Thanks, Karl, for the link. Best, Quentin _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt