Encryption in Ubuntu 9.04
Blaž Repas
linux at bss.si
Fri Jul 17 16:21:35 UTC 2009
Ioannis Vranos pravi:
> Blaž Repas wrote:
>
>> Ioannis Vranos pravi:
>>
>>> Blaž Repas wrote:
>>> >
>>>
>>>
>>>> https://help.ubuntu.com/community/EncryptedFilesystemHowto
>>>>
>>>>
>>> I can't find any definite answer there for my question.
>>>
>>>
>>>
>>>
>>>
>> [quote]
>>
>>
>> OK, which encryption engines does the DeviceMapper support?
>>
>> You can choose all those provided by the crypto-modules of your kernel.
>> The Ubuntu-Kernels come with the full set, including *Twofish, AES, DES
>> and others.*
>>
>>
>> Which of those engines should I choose?
>>
>> I recommend AES. It is reasonably fast and believed to be secure. Avoid
>> DES, it is considered too weak to offer decent protection nowadays.
>>
>>
>> How many bits should the key used by the algorithm have?
>>
>> This depends on your needs for security: A longer key is more secure,
>> but it takes longer to de-/encrypt data using it.
>>
>> With a good crypto algorithm a attacker must use brute force: He has to
>> generate each key and then has to try to unlock the encrypted data with
>> it. So the number of possible keys directly gives the average time
>> needed to break the encryption. So let us play a bit with some numbers:
>>
>> A 256bit key gives about 10^77 (a 1 followed by 77 zeros) different keys
>> while a 128bit key has "only" about 10^38 (a 1 followed by 38 zeros). At
>> the moment a PC can generate and test about 3*10^5 (3 followed by 5
>> zeros) keys per second. So breaking a 128bit key will take about 10^25
>> years (1 followed by 25 zeros), which is longer than the universe
>> exists. That should be secure enough for most users.
>>
>> To understand how secure 128 bit keys are, you may read this analogy
>> <http://www.interesting-people.org/archives/interesting-people/200607/msg00058.html>
>> by Jon Callas:
>>
>> “Imagine a computer that is the size of a grain of sand that can test
>> keys against some encrypted data. Also imagine that it can test a key in
>> the amount of time it takes light to cross it. Then consider a cluster
>> of these computers, so many that if you covered the earth with them,
>> they would cover the whole planet to the height of 1 meter. The cluster
>> of computers would crack a 128-bit key on average in 1,000 years.”
>>
>> Even if you don't believe that the NSA has another planet devoted to key
>> cracking, you still may want to use a longer key. If a weakness in your
>> chosen crypto-module is found, it may limit the keyspace that needs to
>> be tested, and you will then have an effectivly shorter key. Using a 256
>> bit key will keep your data secure much longer if that should happen.
>>
>> [/quote]
>>
>> Hope this helps clearing up your question. And it was in the document,
>> by the way ;-) :-D
>>
>> Have a nice day!
>>
>
>
> If I am not missing something, when we setup encrypted Private directory, or encrypted partition/encrypted
> home directory during installation, there are no options for choosing an algorithm.
>
>
>
>
Hmmm.. interesting...
I'll look around and maybe try it. But i guess it's one of the more
common ones (3des, des, aes).
Have a nice day!
Blaž
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20090717/18983bd5/attachment.html>
More information about the ubuntu-users
mailing list