[dm-crypt] "re-encrypting" ?

Wolfgang Aigner wolfgang.aigner at gmx.de
Sun Aug 14 19:46:23 CEST 2011


On Sunday, August 14, 2011 02:22:57 PM Arno Wagner wrote:
> On Sun, Aug 14, 2011 at 12:32:10PM +0200, Heinz Diehl wrote:
> > On 14.08.2011, Arno Wagner wrote:
> > > As a shorter key does not give significant speed
> > > improvement, aes256-cbc-essiv or aes256-xts is close
> > > to optimal.
> > 
> > On my Intel Core i5 laptop, twofish is actually faster than AES..
> 
> It is on some architectures. It is also less secure.
> 

Cryptgraphically the best know attack against truefish is as far as I 
know still 

http://www.schneier.com/paper-twofish-impossible.html

I'm also not aware of any implementation problems on "some architectures". The 
only think I can argue against twofish is, that there are not so many  
cryptographical analysisis against it as agains Rijndael.

Can  you bring any paper, article or other resource that supports your claim? 

cheers 
Wolfgang


More information about the dm-crypt mailing list