From: Heinz Diehl <htd@fancy-poultry.org>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] 1,5 TB partition: use cbc-essiv or xts-plain?
Date: Mon, 3 Aug 2009 16:34:56 +0200 [thread overview]
Message-ID: <20090803143456.GA17977@fancy-poultry.org> (raw)
In-Reply-To: <20090803125342.CF87216440B5@mail.absint.com>
On 03.08.2009, Henrik Theiling wrote:
> In this particular case: for a 1,5 TB partition, should I use
> cbc-essiv or xts-plain?
Encryption is only one piece in the security chain. You didn't even
tell us _why_ you want to have your data encrypted.
> It seems cbc-essiv is susceptible to watermarking (according to
> Wikipedia, which claims that no IV obfuscation algorithm protects
> against this except in the initial block. Unfortunately, I cannot
> verify this, so it sounds bad to me.
ESSIV has been develop to address this problem and is not prone to
watermarking. The developer of ESSIV is here on the list, and maybe
you're lucky and he will explain this a little bit closer to you.
> And then, xts-plain is said to become weaker on large disks, and some
> crypto implementations warn about this weakness for disks as small as
> 500GB. So what's the alternative?
So they who has raised these claims you described above didn't provide an
explanation for their statements?
> I don't seem to be able to make a decision on my own, so I'd like to
> ask for help.
We shall decide for you? That's generally a bad idea. There's only one
person with the whole knowledge, and that's you. I don't know why you want
to have your harddisk encrypted, what kind of data you have, how important
they are for yourself and others, how the potentially encrypted harddisk
is secured else, and so on and so on...
> There don't need to be simple answers -- I am willing to evaluate my
> problem thoroughly, but so far I found no good comparison.
You can take a look at dm-crypt.c to find out what methods of IV generation
are supported by LUKS/dmcrypt.
Don't know if this helps, I encrypted my Laptop (which carries a lot of
private data, e.g. the password to my online bank account) using
-c twofish-cbc-essiv:sha256
in case it gets lost or stolen, to prevent the thieves from getting access
to my money. I decided to use just this algorithm because I did some benchmarking
and it performed best (the major drag on a Laptop is the slow harddisk).
A lot of distributions also use "-c aes-xts-benbi:sha256".
next prev parent reply other threads:[~2009-08-03 14:32 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-08-03 12:53 [dm-crypt] 1,5 TB partition: use cbc-essiv or xts-plain? Henrik Theiling
2009-08-03 14:34 ` Heinz Diehl [this message]
2009-08-03 16:16 ` Henrik Theiling
2009-08-03 17:34 ` Heinz Diehl
2009-08-03 17:37 ` Heinz Diehl
2013-01-03 9:50 ` Peter Pfundstein
2009-08-03 14:43 ` [dm-crypt] E3E-2A1 - 1, 5 " Heinz Diehl
2009-08-03 20:48 ` [dm-crypt] 1,5 " Moji
2009-08-04 7:42 ` Milan Broz
2009-08-04 13:01 ` Henrik Theiling
2009-08-03 21:46 ` Moji
2009-08-04 13:27 ` Henrik Theiling
2009-08-04 13:55 ` Moji
2009-08-06 11:02 ` Salatiel Filho
2009-08-06 14:32 ` Henrik Theiling
2009-08-06 15:24 ` Heinz Diehl
2009-08-06 16:00 ` Salatiel Filho
2009-08-06 16:02 ` Salatiel Filho
2009-08-07 12:16 ` Salatiel Filho
2009-08-07 12:20 ` Salatiel Filho
2009-08-07 16:00 ` Salatiel Filho
2009-08-08 8:27 ` Heinz Diehl
2009-08-08 10:03 ` Salatiel Filho
2009-08-06 15:43 ` Sam
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090803143456.GA17977@fancy-poultry.org \
--to=htd@fancy-poultry.org \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox