Linux RNG paper

markus reichelt ml at mareichelt.de
Thu May 4 14:26:32 EDT 2006


* Jason Holt <jason at lunkwill.org> wrote:

> >On Thu, 04 May 2006 18:14:09 +0200, markus reichelt <ml at mareichelt.de>
> >wrote:
> >>Agreed; but regarding unix systems, I know of none crypto
> >>implementation that does integrity checking. Not just de/encrypt the
> >>data, but verify that the encrypted data has not been tampered with.
> 
> There's also ecryptfs:
> 
> http://ecryptfs.sourceforge.net/

Thanks to you both; and good to see that ecryptfs is actively
maintained. I might check it out myself but I'll definitely link it.

I'm interested as well in watermark/dictionary attacks (like on
mainline cryptoloop) on ecryptfs. Something like mentioned here,
http://mail.nl.linux.org/linux-crypto/2005-11/msg00016.html

Users of ecrypt are also encouraged to share their views on
stability/reliability of ecryptfs.

-- 
left blank, right bald
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: not available
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20060504/a1d7de1d/attachment.pgp>


More information about the cryptography mailing list