From: +Alan Hicks+ on 1 Sep 2009 15:22 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 2009-09-01, ~kurt <actinouranium(a)earthlink.net> wrote: > The claim is also that you want to use the random number generator when > prep'ing an encrypted hard drive so whoever is trying to decrypt it > won't know where the data starts. I'd think one would be able to figure > out what area had "random" data, and what had encrypted data since I > seriously doubt the encrypted data follows the same distribution. Provided the encryption key is suitably random and the information doesn't have a significant amount of repeated data, I would think it impossible to determine where the encrypted data began and ended using the above method. - -- It is better to hear the rebuke of the wise, Than for a man to hear the song of fools. Ecclesiastes 7:5 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkqddF4ACgkQNj1TaGS9H5I/+QCeO+A+vhPMuxuj1nL6MfKS5sGH zk0AnjytuxcqWyUe6Ja+pszXAcgnavzb =T9AI -----END PGP SIGNATURE-----
From: ~kurt on 3 Sep 2009 23:56 +Alan Hicks+ <alan(a)lizella.netWORK> wrote: > > Provided the encryption key is suitably random and the information > doesn't have a significant amount of repeated data, I would think it > impossible to determine where the encrypted data began and ended using > the above method. The problem is that the random number generators aren't very random. I believe the system ones also produce a uniform distribution, which would probably stick out like a sore thumb. - Kurt
|
Pages: 1 Prev: Slack on a Samsung NC10 netbook? Next: buy slackware without credit card |