LinuxQuestions.org
Review your favorite Linux distribution.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-22-2007, 11:32 AM   #1
whysyn
Member
 
Registered: Jun 2003
Location: Cleveburg, OH
Distribution: mostly Fedora
Posts: 154

Rep: Reputation: 30
synchronous encryption algorithm vs. non-synchronous


What is the difference? How can I tell if an algorithm is synchronous or not?

In OpenSSL, it lists the following as ciphers, but which are synchronous, and what is currently accepted as the strongest?

Code:
bf bf-cbc bf-cfb bf-ecb bf-ofb
Blowfish Cipher

cast cast-cbc
CAST Cipher

cast5-cbc cast5-cfb cast5-ecb cast5-ofb
CAST5 Cipher

des des-cbc des-cfb des-ecb des-ede des-ede-cbc des-ede-cfb des-ede-ofb des-ofb
DES Cipher

des3 desx des-ede3 des-ede3-cbc des-ede3-cfb des-ede3-ofb
Triple-DES Cipher

idea idea-cbc idea-cfb idea-ecb idea-ofb
IDEA Cipher

rc2 rc2-cbc rc2-cfb rc2-ecb rc2-ofb
RC2 Cipher

rc4
RC4 Cipher

rc5 rc5-cbc rc5-cfb rc5-ecb rc5-ofb
RC5 Cipher
 
Old 02-22-2007, 11:33 AM   #2
Matir
LQ Guru
 
Registered: Nov 2004
Location: San Jose, CA
Distribution: Debian, Arch
Posts: 8,507

Rep: Reputation: 128Reputation: 128
Perhaps you mean symmetric vs asymmetric encryption? Asymmetric is better known as public key cryptography: separate keys are used to encrypt and decrypt. In symmetric crypto, the same key is used both ways.
 
Old 02-22-2007, 11:42 AM   #3
whysyn
Member
 
Registered: Jun 2003
Location: Cleveburg, OH
Distribution: mostly Fedora
Posts: 154

Original Poster
Rep: Reputation: 30
Thanks for your fast response!

Let me give you a bit of background. I'm working on setting up drive encryption, using mounting by pam_mount without having the key tied to the user password, and without having to prompt the user for separate authentication to unlock their drive space.

The document states: "an OpenSSL-supported synchronous encryption/decryption algorithm, bf-ecb, for example."

What I'm really trying to figure out is: what is the strongest encryption I can use here?
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
PPTP Reverse(synchronous) Tunnel otisthegbs Linux - Networking 2 09-13-2006 08:07 PM
encryption algorithm in fedora shivaligupta Programming 10 04-25-2005 02:09 AM
Encryption algorithm in fedora core 2 shivaligupta Linux - Software 1 04-24-2005 01:46 PM
Synchronous vs Asynchronous Transfers WeNdeL Linux - Hardware 0 10-22-2003 04:34 PM
Mandrake 9.0 Wireless Works without encryption.. does not with encryption topcat Linux - Wireless Networking 3 05-04-2003 09:47 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:28 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration