Re: Looking for reverse-engineering partner for DiskCryptor

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



W dniu 03.06.2021 o 12:45, Milan Broz pisze:
On 03/06/2021 12:05, Mateusz Jończyk wrote:
Hello,

I'm trying to implement support for opening DiskCryptor partitions. DiskCryptor is licensed under GPLv3, which is incompatible with libcryptsetup's LGPL2+. I'd therefore prefer not to read DiskCryptor source code. I'm asking for someone to do this and provide some information - mostly about header encryption ATM.

I tried to reverse-engineer the format from public info:

   * https://diskcryptor.org/volume/
   * https://security.stackexchange.com/a/83792
I think hashcat can work with DiskCryptor, maybe you can find some info there.

Milan
DONE! I got header decryption running!
Thank you for this suggestion, without it I would not be able to proceed.

Most important things I got wrong:
- password is encoded as a UTF-16LE string,
- PBKDF2 output size is 64 bytes (512 bits) for aes256-xts,
- IV should be 0x01, 0x00, 0x00 ... 0x00,
- XTS mode should pass also over the salt portion of the header (discarding output),

Greetings,
Mateusz
_______________________________________________
dm-crypt mailing list -- dm-crypt@xxxxxxxx
To unsubscribe send an email to dm-crypt-leave@xxxxxxxx




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux