Multiple Ciphers To Prevent Known Plaintext Attacks
I'm just starting to learn about how encryption works, so forgive me if this is a senseless question...
Let's say somebody wants to read a file that I have written, placed in an archive. I have encrypted the archive, using a "computationally secure" algorithm.
From what I understand, if the attacker knows which algorithm I have used AND knows a bit about the data (i.e. it is .RAR format archive containing ASCII text written in English), they can use a known-plaintext attack against the encrypted data to try to figure out the key.
But if I were to encrypt it using one computationally secure algorithm, and then encrypt the encrypted file with a different algorithm, would that not render the known plaintext attacks useless by moving the data away from it's "known" location?
I figure because the known plaintext attacks work on data that has parts which are known, and a "secure" encryption algorithm will not have data that is known to be in a certain spot, they would have to crack the outer layer of encryption by brute force, before being able to run a known plaintext attack on the inner encrypted file.
Is this sound reasoning?
And by the way, I am worried about encrypting all of my backups and losing the key. Would the above method be a safe way for me to back something up, and be able to store a private key (with a good passphrase) along with the backups?
Why, if you need a passphrase to use the key, is it so necessary to guard the private key so closely? Would it render the encryption completely useless if the passphrase protected private key was stored on the backup disk?
It turns out that you are not the first person to think of using multiple encryption passes on a chunk of data. If you use True Crypt for your encryption engine you can encrypt a chunk of data up to three times using three different algorithms. This is transparent to you so it is very convenient.
True Crypt works on entire disk partitions or on container files, not on individual files. You encrypt your backups by putting them on an encrypted partition. That's very different than something like PGP or GPG that encrypts individual files.
Worried about losing your encryption key and losing access to your data? You should be. Consider this. If it were possible to gain access to your encrypted data without knowing the key then the encryption would be worthless. Once you encrypt data you absolutely must remember the key. Period. No exceptions.
You might put your encryption key on a removable Flash memory device in order to remember it. That would also allow you to use a more random sequence in the key rather than some spoken phrase. But if you lose the Flash memory device and you don't remember the key then you cannot gain access to the data. That's it.
I'm not talking about losing the passphrase. I am talking about losing the key file. I can easily remember a 12+ character password, just not a 256-bit encryption key... So what I'm asking is how much security, if any, is lost by using conventional encryption where there is not a keyfile, and is only a password (like using gpg -c --cipher-algo AES256 FILENAME)?
Truecrypt seems interesting - there is a lot of interesting reading about cryptography on their page. Thanks for the link.
|All times are GMT -5. The time now is 03:32 AM.|