Date: Mon, 27 May 2002 13:19:32 +0100 From: Mark Murray <mark@grondar.za> To: Doug Rabson <dfr@nlsystems.com> Cc: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/conf files src/sys/geom geom_aes.c Message-ID: <200205271219.g4RCJWCa045273@grimreaper.grondar.org> In-Reply-To: <200205271031.15065.dfr@nlsystems.com> ; from Doug Rabson <dfr@nlsystems.com> "Mon, 27 May 2002 10:31:14 BST." References: <200205271031.15065.dfr@nlsystems.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> > All sectors are encrypted with AES in CBC mode using a constant key, > > currently compiled in and all zero. > > Isn't this a bit pointless. The on-disk data structures are so predictable > that you have any number of known-plaintext attacks against this. The only > point to encryption at this level is to protect data against physical access > to the drive and this doesn't seem to be able to do that... Not really. Having known-plaintext gives you and angle for a Differential Cryptanalysis attack, but you still need to recover a key (which if your cipher is good enough, should still be hard(tm)). There is often an element of known-plaintext in attacking someone's encrypted data; this may be easier here, so one needs to be that much more careful about changing keys (often) and wiping out in-core data of a sensitive nature. M -- o Mark Murray \_ O.\_ Warning: this .sig is umop ap!sdn To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200205271219.g4RCJWCa045273>