[dm-crypt] "re-encrypting" ?

Arno Wagner arno at wagner.name
Mon Aug 15 09:54:52 CEST 2011


On Sun, Aug 14, 2011 at 07:46:23PM +0200, Wolfgang Aigner wrote:
> On Sunday, August 14, 2011 02:22:57 PM Arno Wagner wrote:
> > On Sun, Aug 14, 2011 at 12:32:10PM +0200, Heinz Diehl wrote:
> > > On 14.08.2011, Arno Wagner wrote:
> > > > As a shorter key does not give significant speed
> > > > improvement, aes256-cbc-essiv or aes256-xts is close
> > > > to optimal.
> > > 
> > > On my Intel Core i5 laptop, twofish is actually faster than AES..
> > 
> > It is on some architectures. It is also less secure.
> > 
> 
> Cryptgraphically the best know attack against truefish is as far as I 
> know still 
> 
> http://www.schneier.com/paper-twofish-impossible.html
> 
> I'm also not aware of any implementation problems on "some architectures". The 
> only think I can argue against twofish is, that there are not so many  
> cryptographical analysisis against it as agains Rijndael.

This is my claim. Also take into account that the NSA spent significant
time on AES, as the US economy depends on it. No such thing for 
twofish. 

Arno
-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno at wagner.name 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 


More information about the dm-crypt mailing list