[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-crypto
Subject: (AES) loopback crypto questions
From: "peter k." <spam-goes-to-dev-null () gmx ! net>
Date: 2001-07-10 20:38:00
[Download RAW message or body]
1) if an attacker has got some files which are on an (AES) encrypted device,
will he be able to decrypt the whole device?
2) is it a good idea to run "cat /dev/zero > zero.file; shred -uv zero.file"
on (AES) encrypted devices to overwrite all free space with random data [to
remove any encrypted data which is left from deleted files from the device
behind the loopback device and confuse attackers]?
the brackets in "(AES)" mean that i'd like to know if the answer applies to
AES only or also other cyphers (i guess so?)
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic