LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-12-2005, 10:59 AM   #16
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941

The argument that "it would still take them billions of years to try all the keys ..." is specious. The Naval Enigma machine that was so thoroughly cracked during WWII had 81,836,646,696,895,916,507,136 possible keys. [citation: http://www.cromwell-intl.com/security/enigma.html] But it failed utterly. Encryption has often been compared to a strong steel door mounted in a wooden wall, or the strongest link in a chain. It's not what matters. You can bet that any encryption scheme will not be attacked by brute-forcing. Banks recently were forced to admit that they routinely shipped unencrypted backup tapes via FedEx. No matter how "secure" their on-line systems may have appeared to be, those tapes (some of which were inevitably lost) were the weak-link. The data was actually unencrypted, not secure at all.

If I were able to get in front of your computer, then the first and most obvious thing that I could do would be to steal it... thus, you wouldn't have access to your own data either!

Otherwise, I would know that the necessay keys will either be something that you possess, like a USB key-token, or a password that you are able to type in and to remember easily. I would also possess several gigabytes of enciphered text, much of it with very predictable characteristics. (More valuable than it may seem: see Probable Plaintext Cryptanalysis of the IP Security Protocols, http://www.securiteinfo.com/ebooks/palm/probtxt.pdf; Practical Approaches to the Recovery of Encrypted Evidence (and citations), http://www.ijde.org/archives/02_fall_art4.html; et al.) I would know that the password is in there somewhere ... like a swapped-out page on the swap device, for instance. Or else in Webster's Unabridged.
 
Old 08-26-2005, 03:11 PM   #17
meles meles
LQ Newbie
 
Registered: Aug 2005
Posts: 10

Rep: Reputation: 0
a simple option

I use Xandros Linus and that comes as standardwith the option to encrypt, using a variety of algorithms, the /home directory. It may not be as secure as total drive encryption, but it is very easy to use and, for most purposes, is strong enough encryption.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Linux password encryption jawad bokhari Linux - Security 13 08-23-2012 07:26 PM
Linux Encryption matux Linux - Security 4 01-29-2005 08:03 PM
Linux encryption command penguinco Fedora 2 12-31-2004 09:40 AM
new DVD encryption and linux dvm Linux - Software 5 11-20-2004 05:23 PM
Mandrake 9.0 Wireless Works without encryption.. does not with encryption topcat Linux - Wireless Networking 3 05-04-2003 08:47 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:01 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration