Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 Oct 2006 18:15:00 +0100 (BST)
From:      Robert Watson <rwatson@FreeBSD.org>
To:        Robert Krten <root@parse.com>
Cc:        freebsd-fs@freebsd.org
Subject:   Re: Naive question about encrypted disks
Message-ID:  <20061025181040.K33725@fledge.watson.org>
In-Reply-To: <20061025180112.P33725@fledge.watson.org>
References:  <200610251642.k9PGgr4t054536@amd64.ott.parse.com> <20061025180112.P33725@fledge.watson.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, 25 Oct 2006, Robert Watson wrote:

> Deriving the key when you have examples of plaintext and ciphertext for that 
> plaintext is known as a "known-plaintext attack".  Resistence to 
> known-plaintext attacks is one of the most important properties required of 
> modern crypto algorithms.  Other examples of cases where resistance to 
> known-plaintext attacks is critical include:

FYI, there are a number of quite good books on cryptography and the use of 
cryptography available.  Some of them even manage to get across the key 
concepts to be aware of as a consumer of cryptography without losing the 
reader in the details of how the algorithms are implemented. :-)

Ross Anderson's Security Engineering is now available online:

     http://www.cl.cam.ac.uk/~rja14/book.html

His crypto chapter (5) is both accessible and informative.

Robert N M Watson
Computer Laboratory
University of Cambridge



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20061025181040.K33725>