Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Jan 2015 05:30:51 +0200
From:      Kimmo Paasiala <kpaasial@gmail.com>
To:        Rozhuk.IM@gmail.com
Cc:        FreeBSD Hackers <freebsd-hackers@freebsd.org>, freebsd-geom@freebsd.org, Adam Nowacki <nowakpl@platinum.linux.pl>
Subject:   Re: ChaCha8/12/20 and GEOM ELI tests
Message-ID:  <CA%2B7WWSf%2B7N6foTKxarANfwgAitQXfxt%2B_e-HgcokzU5cVparAA@mail.gmail.com>
In-Reply-To: <CA%2B7WWScVQ9LwQQ3NR8ipkdxroqdg26Q2dB__%2B2wRr_0kPmJODQ@mail.gmail.com>
References:  <54b33bfa.e31b980a.3e5d.ffffc823@mx.google.com> <54B4AE55.9090205@platinum.linux.pl> <54b5d299.4914980a.61cd.43a6@mx.google.com> <CA%2B7WWScVQ9LwQQ3NR8ipkdxroqdg26Q2dB__%2B2wRr_0kPmJODQ@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Jan 14, 2015 at 5:21 AM, Kimmo Paasiala <kpaasial@gmail.com> wrote:
>> Depends on the capabilities of the attacker.
>>
>> To be able to continuously read encrypted sectors for data collection is too much.
>>
>
> When talking about disk encryption the first assumption is that the
> attacker always has this capability, even with so much power the
> attacker shouldn't be able to break the encryption scheme. If he can
> then the encryption scheme is not secure.
>
> -Kimmo

Sorry pressed sent too fast. The last sentence should have been:

Ift the attacker can learn anything about the unencrypted data or
predict something about future encrypted or unencrypted blocks by
analyzing the previous encrypted blocks the encryption scheme should
be considered insecure.

-Kimmo



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2B7WWSf%2B7N6foTKxarANfwgAitQXfxt%2B_e-HgcokzU5cVparAA>