Re: some questions on dm-crypt/cryptsetup and LUKS2+integrity

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hey.


Coming back (from vacation ;-) and back) on this and since 4.18 is out
in the meantime:

>2) Use new native AEAD algorithms with 128bit nonces (in kernel 4.18
>and later)
>(aegis128,aegis256,aegis128l,morus640,morus1280), for example
>
>  "--cipher aegis128-random --key-size 128 --integrity aead" or
>  "--cipher aegis256-random --key-size 256 --integrity aead" or
<  "--cipher morus640-random --key-size 128 --integrity aead" ...

1) Should these work by now with the current cryptsetup? Or will one
require 2.1?


2a) AFAIU, AEGIS will always have either key-sizes of 128 or 256 bit,
right?
I'm also assuming that larger key size will give a better security
margin,right?
But what's the 128L?


2b) And MORUS will have either 640 bit for the internal state with
"only" 128 bit keys... OR... the 1280 bit internal state with either
128 or 256 bit keys, right?
Again, I'm assuming that larger internal state and larger key size will
give a better security margin, right?


3) Is there any comparison (in terms of security) between AEGIS and
MORUS?


Thanks,
Chris.

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
https://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux