A weak cryptoloop implementation in Linux?
Posted Jan 23, 2004 20:50 UTC (Fri) by Ross
In reply to: A weak cryptoloop implementation in Linux?
Parent article: A weak cryptoloop implementation in Linux?
Better would be to generate that random string through a pseudorandom
number generator given a seed like the position of that block. I thought
this was already done? I mean this is basically the initialization
vector and without it identical blocks on disk would be identical after
they were encypted... leaking all kinds of information. If this is not
done it is a very serious bug. If it is done, why is this other attack
a problem? Is the seeds for the generator the same for every filesystem?
If so, a simple fix would be to store a single value to XOR with the
offset before calculating the IV.
to post comments)