[prev in list] [next in list] [prev in thread] [next in thread] 

List:       linux-crypto
Subject:    Re: (AES) loopback crypto questions
From:       Mike Touloumtzis <miket () bluemug ! com>
Date:       2001-07-11 21:50:12
[Download RAW message or body]

On Wed, Jul 11, 2001 at 10:47:29AM +0100, Dale Amon wrote:
>
> On Tue, Jul 10, 2001 at 10:38:00PM +0200, peter k. wrote:
> >
> > 1) if an attacker has got some files which are on an (AES)
> > encrypted device, will he be able to decrypt the whole device?
> 
> It might help slightly, ie Known Plaintext Attack, but probably
> not a lot.

If your cipher is vulnerable to a known plaintext attack much
faster than brute force, you should be using a better cipher.
Such an attack would be considered by cryptographers to be a
"break" of the cipher.

Computatational immunity to _chosen_ plaintext attacks is a
sine qua non of a good cipher.

miket

Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic