Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 May 2002 13:19:32 +0100
From:      Mark Murray <mark@grondar.za>
To:        Doug Rabson <dfr@nlsystems.com>
Cc:        cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/sys/conf files src/sys/geom geom_aes.c 
Message-ID:  <200205271219.g4RCJWCa045273@grimreaper.grondar.org>
In-Reply-To: <200205271031.15065.dfr@nlsystems.com> ; from Doug Rabson <dfr@nlsystems.com>  "Mon, 27 May 2002 10:31:14 BST."
References:  <200205271031.15065.dfr@nlsystems.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
> >   All sectors are encrypted with AES in CBC mode using a constant key,
> >   currently compiled in and all zero.
> 
> Isn't this a bit pointless. The on-disk data structures are so predictable 
> that you have any number of known-plaintext attacks against this. The only 
> point to encryption at this level is to protect data against physical access 
> to the drive and this doesn't seem to be able to do that...

Not really. Having known-plaintext gives you and angle for a Differential
Cryptanalysis attack, but you still need to recover a key (which if your
cipher is good enough, should still be hard(tm)).

There is often an element of known-plaintext in attacking someone's
encrypted data; this may be easier here, so one needs to be that much
more careful about changing keys (often) and wiping out in-core data
of a sensitive nature.

M

-- 
o       Mark Murray
\_
O.\_    Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200205271219.g4RCJWCa045273>