From owner-freebsd-fs@FreeBSD.ORG Wed Oct 25 17:15:01 2006 Return-Path: X-Original-To: freebsd-fs@freebsd.org Delivered-To: freebsd-fs@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C968416A403 for ; Wed, 25 Oct 2006 17:15:01 +0000 (UTC) (envelope-from rwatson@FreeBSD.org) Received: from cyrus.watson.org (cyrus.watson.org [209.31.154.42]) by mx1.FreeBSD.org (Postfix) with ESMTP id 17A6043D66 for ; Wed, 25 Oct 2006 17:15:01 +0000 (GMT) (envelope-from rwatson@FreeBSD.org) Received: from fledge.watson.org (fledge.watson.org [209.31.154.41]) by cyrus.watson.org (Postfix) with ESMTP id A5F8A46E6C; Wed, 25 Oct 2006 13:15:00 -0400 (EDT) Date: Wed, 25 Oct 2006 18:15:00 +0100 (BST) From: Robert Watson X-X-Sender: robert@fledge.watson.org To: Robert Krten In-Reply-To: <20061025180112.P33725@fledge.watson.org> Message-ID: <20061025181040.K33725@fledge.watson.org> References: <200610251642.k9PGgr4t054536@amd64.ott.parse.com> <20061025180112.P33725@fledge.watson.org> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: freebsd-fs@freebsd.org Subject: Re: Naive question about encrypted disks X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 25 Oct 2006 17:15:01 -0000 On Wed, 25 Oct 2006, Robert Watson wrote: > Deriving the key when you have examples of plaintext and ciphertext for that > plaintext is known as a "known-plaintext attack". Resistence to > known-plaintext attacks is one of the most important properties required of > modern crypto algorithms. Other examples of cases where resistance to > known-plaintext attacks is critical include: FYI, there are a number of quite good books on cryptography and the use of cryptography available. Some of them even manage to get across the key concepts to be aware of as a consumer of cryptography without losing the reader in the details of how the algorithms are implemented. :-) Ross Anderson's Security Engineering is now available online: http://www.cl.cam.ac.uk/~rja14/book.html His crypto chapter (5) is both accessible and informative. Robert N M Watson Computer Laboratory University of Cambridge