Questions about misuse vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi

2 separate questions:

1.  I've read that you are not supposed to use the same gpg key on different loop-aes volumes.  Why?  Even if the volumes contains some (but not all)  data in common, how does that help an attacker?

2. How long in bytes does a known plaintext string encrypted at a known position on a v3.x loop-aes encrypted device have to be to allow an attacker to reverse engineer what the v3.x plaintext multiline key must be?

Thanks


      

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/



[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux