[Cryptography] LUKS on ATA versus on SSD

Kent Borg kentborg at borg.org
Thu Jan 1 01:40:35 EST 2026


On 12/31/25 3:54 PM, Douglas Lucas wrote:
> In other words,
> is ATA better for encryption because it's less complicated than SSD and
> therefore there are fewer things to screw up. An engineer once
> (oversimplifying) told me ATA just stores 1s and 0s, and therefore
> encrypting it with LUKS is straightforward, but SSD does a lot of
> remapping/algorithms/probabilities to try to speed things up, thus
> opening up a greater surface area of vulnerability

As far as I know when doing LUKS/dm-crypt it is a clean layer on top of 
a block device, and the block device can be anything that implements a 
block device. The bits that get presented to the layer below are 
encrypted the same whether it is spinning iron oxide ATA disk or an SSD 
flash memory or an S3 bucket. Recording it on a different medium can't 
magically break the encryption. Which makes sense if it is done 
correctly. So from a security perspective, the two should both be good.

That said, the two /are/ very different. SSDs tend to like to know when 
portions aren't used so use that space for wear leveling, and that needs 
to be passed down the layers. Linux knows how to do this, but things 
have to be configured right. I think this happens fine on the encrypted 
SSD in my laptop, but the SSDs I use for offline backups, in USB 
enclosures, don't seem to know fstrim, and I haven't figured why not. 
But this isn't a security hole.

-kb

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20251231/b2318e61/attachment.htm>


More information about the cryptography mailing list