[24728] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Linux RNG paper

daemon@ATHENA.MIT.EDU (Florian Weimer)
Fri May 5 16:47:32 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: "Travis H." <solinym@gmail.com>
Cc: cryptography@metzdowd.com
Date: Fri, 05 May 2006 21:51:24 +0200
In-Reply-To: <d4f1333a0605041144y1be34f53g212aab84fa1a623f@mail.gmail.com>
	(Travis H.'s message of "Thu, 4 May 2006 13:44:48 -0500")

* Travis H.:

> On 5/4/06, markus reichelt <ml@mareichelt.de> wrote:
>> Agreed; but regarding unix systems, I know of none crypto
>> implementation that does integrity checking. Not just de/encrypt the
>> data, but verify that the encrypted data has not been tampered with.
>
> Are you sure?  There's a aes-cbc-essiv:sha256 cipher with dm-crypt.
> Are they using sha256 for something other than integrity?

AFAIK, they use it to generate the IVs for CBC mode.  Directly using
the sector numbers leads to fingerprinting vulnerabilities.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post