Encryption in Ubuntu 9.04
Ioannis Vranos
ivranos at freemail.gr
Fri Jul 17 13:16:29 UTC 2009
Blaž Repas wrote:
> Ioannis Vranos pravi:
>> Blaž Repas wrote:
>> >
>>
>>> https://help.ubuntu.com/community/EncryptedFilesystemHowto
>>>
>>
>>
>> I can't find any definite answer there for my question.
>>
>>
>>
>>
> [quote]
>
>
> OK, which encryption engines does the DeviceMapper support?
>
> You can choose all those provided by the crypto-modules of your kernel.
> The Ubuntu-Kernels come with the full set, including *Twofish, AES, DES
> and others.*
>
>
> Which of those engines should I choose?
>
> I recommend AES. It is reasonably fast and believed to be secure. Avoid
> DES, it is considered too weak to offer decent protection nowadays.
>
>
> How many bits should the key used by the algorithm have?
>
> This depends on your needs for security: A longer key is more secure,
> but it takes longer to de-/encrypt data using it.
>
> With a good crypto algorithm a attacker must use brute force: He has to
> generate each key and then has to try to unlock the encrypted data with
> it. So the number of possible keys directly gives the average time
> needed to break the encryption. So let us play a bit with some numbers:
>
> A 256bit key gives about 10^77 (a 1 followed by 77 zeros) different keys
> while a 128bit key has "only" about 10^38 (a 1 followed by 38 zeros). At
> the moment a PC can generate and test about 3*10^5 (3 followed by 5
> zeros) keys per second. So breaking a 128bit key will take about 10^25
> years (1 followed by 25 zeros), which is longer than the universe
> exists. That should be secure enough for most users.
>
> To understand how secure 128 bit keys are, you may read this analogy
> <http://www.interesting-people.org/archives/interesting-people/200607/msg00058.html>
> by Jon Callas:
>
> “Imagine a computer that is the size of a grain of sand that can test
> keys against some encrypted data. Also imagine that it can test a key in
> the amount of time it takes light to cross it. Then consider a cluster
> of these computers, so many that if you covered the earth with them,
> they would cover the whole planet to the height of 1 meter. The cluster
> of computers would crack a 128-bit key on average in 1,000 years.”
>
> Even if you don't believe that the NSA has another planet devoted to key
> cracking, you still may want to use a longer key. If a weakness in your
> chosen crypto-module is found, it may limit the keyspace that needs to
> be tested, and you will then have an effectivly shorter key. Using a 256
> bit key will keep your data secure much longer if that should happen.
>
> [/quote]
>
> Hope this helps clearing up your question. And it was in the document,
> by the way ;-) :-D
>
> Have a nice day!
If I am not missing something, when we setup encrypted Private directory, or encrypted partition/encrypted
home directory during installation, there are no options for choosing an algorithm.
--
Ioannis A. Vranos
C95 / C++03 Developer
http://www.cpp-software.net
More information about the ubuntu-users
mailing list