[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-crypto
Subject: Re: (AES) loopback crypto questions
From: Mike Touloumtzis <miket () bluemug ! com>
Date: 2001-07-11 21:50:12
[Download RAW message or body]
On Wed, Jul 11, 2001 at 10:47:29AM +0100, Dale Amon wrote:
>
> On Tue, Jul 10, 2001 at 10:38:00PM +0200, peter k. wrote:
> >
> > 1) if an attacker has got some files which are on an (AES)
> > encrypted device, will he be able to decrypt the whole device?
>
> It might help slightly, ie Known Plaintext Attack, but probably
> not a lot.
If your cipher is vulnerable to a known plaintext attack much
faster than brute force, you should be using a better cipher.
Such an attack would be considered by cryptographers to be a
"break" of the cipher.
Computatational immunity to _chosen_ plaintext attacks is a
sine qua non of a good cipher.
miket
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic