From: | Chris Browne <cbbrowne(at)acm(dot)org> |
---|---|
To: | pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: New types for transparent encryption |
Date: | 2009-07-08 16:43:37 |
Message-ID: | 87fxd715xi.fsf@dba2.int.libertyrms.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
gsstark(at)mit(dot)edu (Greg Stark) writes:
> However I have a different concern which hasn't been raised yet.
> Encrypting lots of small chunks of data with the same key is a very
> dangerous thing to do and it's very tricky to get right.
Yeah, that's exactly the sort of thing that would be Most Useful for
someone trying to do differential cryptanalysis.
http://en.wikipedia.org/wiki/Differential_cryptanalysis
It would provide an *exact* vector for differential attack if the
attacker has the ability to add in a series of bits of data of their
choosing before capturing the thus-encrypted dump.
If you add some more-or-less-randomish salt, ala SSHA, that could be
of some tiny help, maybe, arguably, but I doubt that's usable :-(.
http://www.openldap.org/faq/data/cache/347.html
--
let name="cbbrowne" and tld="acm.org" in String.concat "@" [name;tld];;
http://linuxfinances.info/info/sap.html
Why do scientists call it research when looking for something new?
From | Date | Subject | |
---|---|---|---|
Next Message | Chris Browne | 2009-07-08 16:55:48 | Re: New types for transparent encryption |
Previous Message | Kenneth Marshall | 2009-07-08 16:42:20 | Re: *_collapse_limit, geqo_threshold |