[148174] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] randomness +- entropy

daemon@ATHENA.MIT.EDU (Bill Stewart)
Wed Nov 13 20:03:02 2013

X-Original-To: cryptography@metzdowd.com
Date: Wed, 13 Nov 2013 14:17:27 -0800
To: Bear <bear@sonic.net>
From: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <1384359461.5094.7.camel@excessive.dsl.static.sonic.net>
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

At 08:17 AM 11/13/2013, Bear wrote:
>Why would an encrypted drive really need a *new* key during
>bootup?

The only time it's an issue is the first boot for a new system;
after that you're reusing the same key.
The question is whether that key is entirely user-entered,
or whether it includes some kind of RNG as well.
(OTOH, if it's handled entirely by the BIOS and not the OS,
then it's not a Linux problem.)

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post