From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([69.77.167.62] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1KBa6T-00043C-TW for garchives@archives.gentoo.org; Wed, 25 Jun 2008 18:52:26 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 8824DE0307; Wed, 25 Jun 2008 18:52:24 +0000 (UTC) Received: from mail.gmx.net (mail.gmx.net [213.165.64.20]) by pigeon.gentoo.org (Postfix) with SMTP id 12D25E0320 for ; Wed, 25 Jun 2008 18:52:23 +0000 (UTC) Received: (qmail invoked by alias); 25 Jun 2008 18:52:22 -0000 Received: from p3E9E51F6.dip.t-dialin.net (EHLO nargond.local) [62.158.81.246] by mail.gmx.net (mp005) with SMTP; 25 Jun 2008 20:52:22 +0200 X-Authenticated: #26187417 X-Provags-ID: V01U2FsdGVkX1+hPNNOfaGhcJi/fX5qEoBke7qXpF62Ro2+B8DURN X2kphUxh7dbjsd From: Sebastian Wiesner To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] loop-aes + extra-ciphers... Date: Wed, 25 Jun 2008 20:51:35 +0200 User-Agent: KMail/1.9.9 References: <4861AB64.9000709@comcast.net> <20080625162022.5c4d5e35@ilievnet.com> <486260CC.109@comcast.net> In-Reply-To: <486260CC.109@comcast.net> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart3454938.vV6z624MR3"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit Message-Id: <200806252051.41624.basti.wiesner@gmx.net> X-Y-GMX-Trusted: 0 X-Archives-Salt: 93976101-b214-4aa4-bf83-11e10b7b4188 X-Archives-Hash: e0a6502e583951d27a3daccc029915ff --nextPart3454938.vV6z624MR3 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Chris Walters at Wednesday 25 June 2008, 17:14:20 > | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], > | etc) can break those algorithms relatively easy. On the other hand even > | weaker algorithms can protect your data against laptop thieves. You had better used the acronym FUD instead of the word "rumor". US=20 government itself has declared Rijndael 256 sufficient for classified=20 information up to top secret. This level of security is shared among all=20 AES finalists like RC6 or Serpent. > That's more than a rumor. Another three letter agency (NSA) has networks > of supercomputers that can brute force a passphrase is little time. Bruteforcing a _passphrase_ is not the same as bruteforcing a key. An both= =20 of these don't have nothing to do with the algorithm itself. They are=20 side-attacks ... a weak passphrase is user idiocity, not a cipher=20 weakness. > It is not that I'm terribly paranoid about people getting my data, I just > want to make it a little harder. What's the point in making the impossible even harder? > Of course, it is always possible to insert code that will send the > unencrypted data, once you've logged on - not easy for the casual user, > but for the guru, an easy thing.=20 That's operating system security and has nothing to do with cryptology. =20 Someone having only your hard disk can't inject a rootkit into the system. =2D-=20 =46reedom is always the freedom of dissenters. (Rosa Luxemburg) --nextPart3454938.vV6z624MR3 Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEABECAAYFAkhik70ACgkQn3IEGILecb4nmwCaA58yL7HOlCzgCvvksF4+mO0B 7DkAn1u8cEvN7DbBMGPhP8/QT1VqvxOI =/6e0 -----END PGP SIGNATURE----- --nextPart3454938.vV6z624MR3-- -- gentoo-user@lists.gentoo.org mailing list