Security criteria

Menno Boer mboer at dds.nl
Tue Jan 6 09:23:08 PST 2004


Ian, while you are filling that humongous harddisc ????

greetz 
-- 
To mess up a Linux box, you need to work at it;
To mess up your Windows box, you just need to work on it.
                                       - Scott Granneman 


Citeren Ian Molton <spyro at f2s.com>:

> On Tue, 06 Jan 2004 11:03:36 +0000
> Andy Bennett <andyjpb at ashurst.eu.org> wrote:
> 
> > Encrypting only what is sensitive show attackers where to concentrate 
> > their efforts. With mathematically unbreakable codes (which do exist) 
> > any amount of data is unhelpful.
> 
> With a mathematically unbreakable code it doesnt matter if they know where to
> concentrate their efforts or not, either, does it?
> 
> Im not convinced a truely 'unbreakable' code exists anyhow.
> 
> > An example of a mathematically unbreakable code is one where the key is 
> > the same length as the data being encrypted.
> 
> yeah, and also totally useless for encrypting a harddisc - where are you
> going to generate 200GB of truely random entropy ?
> 
> 
> -- 
> Spyros lair: http://www.mnementh.co.uk/   ||||   Maintainer: arm26 linux
> 
> Do not meddle in the affairs of Dragons, for you are tasty and good with
> ketchup.
> -- 
> http://linuxfromscratch.org/mailman/listinfo/hlfs-dev
> FAQ: http://www.linuxfromscratch.org/faq/
> Unsubscribe: See the above information page
> 
> 




More information about the hlfs-dev mailing list