[prev in list] [next in list] [prev in thread] [next in thread] 

List:       linux-crypto
Subject:    (AES) loopback crypto questions
From:       "peter k." <spam-goes-to-dev-null () gmx ! net>
Date:       2001-07-10 20:38:00
[Download RAW message or body]

1) if an attacker has got some files which are on an (AES) encrypted device,
will he be able to decrypt the whole device?

2) is it a good idea to run "cat /dev/zero > zero.file; shred -uv zero.file"
on (AES) encrypted devices to overwrite all free space with random data [to
remove any encrypted data which is left from deleted files from the device
behind the loopback device and confuse attackers]?

the brackets in "(AES)" mean that i'd like to know if the answer applies to
AES only or also other cyphers (i guess so?)



Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic