LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-05-2014, 04:54 AM   #1
postcd
Member
 
Registered: Oct 2013
Posts: 527

Rep: Reputation: Disabled
Is ccrypt AES 256bit secure enough?


Toucan software uses 256bit AES encryption using ccrypt (https://en.wikipedia.org/wiki/Ccrypt)

i want to ask if its secure to use this ccrypt encryption for storing .TXT file with my passwords on cloud storage like Google Drive?
 
Old 02-05-2014, 07:33 AM   #2
Doc CPU
Senior Member
 
Registered: Jun 2011
Location: Stuttgart, Germany
Distribution: Mint, Debian, Gentoo, Win 2k/XP
Posts: 1,099

Rep: Reputation: 344Reputation: 344Reputation: 344Reputation: 344
Hi there,

Quote:
Originally Posted by postcd View Post
Toucan software uses 256bit AES encryption using ccrypt (https://en.wikipedia.org/wiki/Ccrypt)

i want to ask if its secure to use this ccrypt encryption for storing .TXT file with my passwords on cloud storage like Google Drive?
I'm not an expert in encryption, and I don't feel competent enough to assess different methods and algorithms.

However, security is always a relative issue. You may assume that some organisation somewhere in the world has enough computer power to crack any encryption in a reasonable time. The question is whether cost and effect match up against each other. That being said, think about how important your data might be for someone else, and how much it would hurt you if it got disclosed.

Anyway, I would never store sensitive, personal information like passwords on a storage medium outside my own private scope. Passwords should be difficult for someone else to guess or to find out, yet logical or systematic enough for yourself to memorize. If you choose your passwords according to that motto, there's no need to store them anyway.

A good strategy is to memorize a sentence that makes sense, and use the first letters of each word as the password. For instance, I might use the sentence "My grandma died in 92 while I was in London". The password built from that sentence is Mgdi92wIwiL. Easy to remember for me, hard to guess for others. Has uppercase and lowercase letters, and digits.

And use different passwords for different services, in case one gets compromised nevertheless, maybe by your own fault, or maybe because the service provider's database gets hacked.

[X] Doc CPU
 
Old 02-05-2014, 07:35 AM   #3
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,649
Blog Entries: 4

Rep: Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934
All of these peer-reviewed, commercial-grade crypto algorithms are "secure enough" ... if properly used ... against a brute-force attack against the password or a known-plaintext attack against the content. The key to the above sentence, however, is: "if properly used."

Classical German Enigma is still more than powerful enough to protect a simple text message for a very long time against this sort of disclosure. Yet, how did the Allies break it using electronmechanical and simple computing equipment? Mostly, by exploiting human weaknesses in the keying system, and in the procedures for its use. The same thing is still true with the much-stronger ciphers of today.

Frankly, I would use publicly-available tools such as GPG, OpenSSL, and/or VPN to do all of my encryption, and I would strive to use them "properly." In other words, digital certificates protected with passwords, exchanging only digitally-signed messages with recipients who did the same ... and of course, exchanging nothing and doing nothing that, if revealed, would land me in prison for the rest of my foreshortened life. I don't think that I could ever do anything "roll-your-own" that would come close to the established security of these peer-reviewed and professionally-designed tools, which combine strong key-management with (usually, pluggable) cipher engines including among others AES256.

Last edited by sundialsvcs; 02-05-2014 at 07:36 AM.
 
Old 02-05-2014, 11:36 AM   #4
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Who is your adversary ? Who are you trying to keep these passwords from ? From your average haxxor, yeah it's secure enough if you use a strong password. From the NSA, not likely.

Personally I would never store passwords, even encrypted, on someone else's machine. However, if you use a strong password, nobody, except the three letter agencies has a real chance of breaking it.
 
Old 02-05-2014, 12:30 PM   #5
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,070

Rep: Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897
Well, yes and no, primarily no.

It depends whether you are trying to outrun the bear, and it depends what threat you are up against.

If you believe that Google's (or whoever's) security is such that the file can never fall into the hands of miscreants, or that miscreants will never be sufficiently interested to expend any effort, you are basically home free. History tells us that this has been a very bad bet at various times (not with Google, necessarily, but with others in a similar position), but you could choose to be very foolish and take it.

Now,the alternative is to assume that the file does fall into a miscreant's hands. Now, really, if this or these miscreant(s) have an infinte amount of time/'goes' and are sufficiently interested, then they'll crack it. See this and this for a bit of an update on how fast brute force attempts on passwords can progress with the right hardware. Even without the right hardware, if you are sufficiently interested you can just wait for longer and still get a result.

In practice, you are really betting on the miscreant(s) not being sufficiently interested to wait, or not being sufficiently clued up to actually try to crack it. This is not exactly a good bet, either, but you might get away with it (but, if you are off the hook, it quite probably wasn't the encryption that got you off the hook, so much as a lack of application on the part of the miscreants). Depending on what else you have there, some 'security by obscurity' might help (ie, is it at all apparent that it is a password file), but you can't really rely on it.

Of course, with a normal password situation, the miscreant has only a limited amount of 'goes' at a password before some one/thing notices and stops the process, so that gets you off the hook (usually) with even slightly suspect passwords and encryption. But, if you assume that someone has the file, that doesn't work.

You might get of the hook if you felt that you would know when there was an exploit (not necessarily true) and that you could change all of the passwords faster than the miscreant could crack them. Possible, but not reliable, largely because it may be some time after the data leaks before you get to know. Obviously, you would hope that if there was a leak you would know immediately, but, quite often, it takes a small number of weeks before those who should be protecting the data confess that their protection hasn't been as complete as you would have liked. And that's enough to sink the 'change the passwords immediately' solution.
 
Old 02-05-2014, 01:31 PM   #6
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Let me put it another way. The NSA uses AES 256-bit for encrypting their top secret documents. This means that nobody, except perhaps the NSA can crack / backdoor it, as long as you use a strong password.

Here's more on this question:
http://crypto.stackexchange.com/ques...ure-is-aes-256
 
Old 02-05-2014, 03:07 PM   #7
Doc CPU
Senior Member
 
Registered: Jun 2011
Location: Stuttgart, Germany
Distribution: Mint, Debian, Gentoo, Win 2k/XP
Posts: 1,099

Rep: Reputation: 344Reputation: 344Reputation: 344Reputation: 344
Hi there,

Quote:
Originally Posted by metaschima View Post
Let me put it another way. The NSA uses AES 256-bit for encrypting their top secret documents. This means that nobody, except perhaps the NSA can crack / backdoor it, as long as you use a strong password.
that may be true, I don't know. But yet, it only applies to the security or vulnerability of the ecryption method as such. As soon as you're too careless with your password (for whatever reason), all that top-class encryption isn't worth a penny.

And you may believe that if the stakes are high enough, some organisations will stop at nothing. I'm not talking about bribery or blackmailing. Too primitive, though sometimes effective. But don't underestimate the power of psychology.

A long time ago, I went to Israel for three days on business terms. Over there, I was accompanied by a local representative most of the time. That was annoying in some situations, but on the whole I was grateful for him to be there and save me from offending the locals inadvertently. When he took me to Tel Aviv airport for my flight home, he warned me: Isreal customs, he said, is notorious for employing very attractive women for baggage check and query at check in. The experience is that men talk more freely to a nice girl and will much easier lose their inhibition. And yes, the young woman who checked my passport and suitcase contents was indeed a gorgeous one ...

[X] Doc CPU
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
dm-crypt aes-xts-plain64 vs aes-cbc-essiv for volumes > 2TiB Molly Linux - Security 1 09-13-2010 05:24 PM
Bcrypt, Ccrypt and GPG Amdx2_x64 Linux - Security 4 08-09-2008 03:28 PM
Ccrypt Steel_J Linux - Security 2 06-03-2006 09:14 PM
Slackware 9.1, DWL-G520+, 256bit WEP narusegawa Linux - Wireless Networking 0 02-11-2004 04:01 AM
need to create 8bpp (256bit) images... jhorvath Linux - Software 1 01-27-2003 03:58 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:00 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration