Date: Wed, 25 Oct 2006 18:15:00 +0100 (BST) From: Robert Watson <rwatson@FreeBSD.org> To: Robert Krten <root@parse.com> Cc: freebsd-fs@freebsd.org Subject: Re: Naive question about encrypted disks Message-ID: <20061025181040.K33725@fledge.watson.org> In-Reply-To: <20061025180112.P33725@fledge.watson.org> References: <200610251642.k9PGgr4t054536@amd64.ott.parse.com> <20061025180112.P33725@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 25 Oct 2006, Robert Watson wrote: > Deriving the key when you have examples of plaintext and ciphertext for that > plaintext is known as a "known-plaintext attack". Resistence to > known-plaintext attacks is one of the most important properties required of > modern crypto algorithms. Other examples of cases where resistance to > known-plaintext attacks is critical include: FYI, there are a number of quite good books on cryptography and the use of cryptography available. Some of them even manage to get across the key concepts to be aware of as a consumer of cryptography without losing the reader in the details of how the algorithms are implemented. :-) Ross Anderson's Security Engineering is now available online: http://www.cl.cam.ac.uk/~rja14/book.html His crypto chapter (5) is both accessible and informative. Robert N M Watson Computer Laboratory University of Cambridge
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20061025181040.K33725>