Date: Wed, 25 Oct 2006 18:15:00 +0100 (BST) From: Robert Watson <rwatson@FreeBSD.org> To: Robert Krten <root@parse.com> Cc: freebsd-fs@freebsd.org Subject: Re: Naive question about encrypted disks Message-ID: <20061025181040.K33725@fledge.watson.org> In-Reply-To: <20061025180112.P33725@fledge.watson.org> References: <200610251642.k9PGgr4t054536@amd64.ott.parse.com> <20061025180112.P33725@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 25 Oct 2006, Robert Watson wrote:
> Deriving the key when you have examples of plaintext and ciphertext for that
> plaintext is known as a "known-plaintext attack". Resistence to
> known-plaintext attacks is one of the most important properties required of
> modern crypto algorithms. Other examples of cases where resistance to
> known-plaintext attacks is critical include:
FYI, there are a number of quite good books on cryptography and the use of
cryptography available. Some of them even manage to get across the key
concepts to be aware of as a consumer of cryptography without losing the
reader in the details of how the algorithms are implemented. :-)
Ross Anderson's Security Engineering is now available online:
http://www.cl.cam.ac.uk/~rja14/book.html
His crypto chapter (5) is both accessible and informative.
Robert N M Watson
Computer Laboratory
University of Cambridge
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20061025181040.K33725>
