-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 2016-07-25 01:27, 0'192348'019438'0194328'0914328'0931 wrote: > Hallo, > > perhaps a fast option will be a strong encrypted disk and the nuke feature > to destroy the password
I think you mean wipe the LUKS header. > or better password-expansion (a hash which is longer than the password)... > Are you referring to a key derivation function (KDF)? That's a different matter. > - full disk encryption - double full disk encryption with two independent > passwords and independent encryption schemes - customization of keyword > length - customization of the cipher - no storage of passwords only of the > password-expansion (which don't shorten the password like the standard > hash, which makes the original password longer, so if you steal the disk > you get some extra effort to crack the code) - customization of the wrong > tries, e.g. 10 times and than the "password-hashes" get wiped out (this > avoids a simple brute forward attack) - long key setup-time (of ca. 0.5 > seconds), will slow down sophisticated brute forward attacks > > In the end of the day the security of the password management, the > security of one or the other cipher and the effectiveness of the wiping > will safe your information. > Not sure how all this is relevant to the subject of this thread. > Pro: It will be very fast (approx. under 3 seconds) Wiping the LUKS header would be fast, yes. > Cons: Not water-proof against Quantum Computer Attacks (you will need more > modern ciphers) As far as we know, AES-256 will remain resistant to post-quantum attacks. Effective key length will be halved, so AES-256 should be roughly as strong as pre-quantum AES-128, but that's still pretty secure. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXleh9AAoJENtN07w5UDAwupsQALwNlLqs+CA8cL4rZWn6t3Oz Z9UkEomyvSXjeQfK583AMKPI0Jc76ZHjPBu6U84CxSe86Vw+6geTMjhhJC/Ddg1B Q3KyyuX1LRoJzLKXu8bOsN4olEZteLScIY+9c1bqcDBxckl6+fn+R5fKCOdfnT5Z PJPAeAUxnkvTdUETgIEhKqxY3WjpOjjcG9vKvKlN7uPuTqxB35WNDb3bGpd+jX5k xefdm4cLnPeWu1o2r6ZEkblzMAzSHVnMHGcb72yQsLj9q+RtcEnoTLw5z2cRq0YJ SAokOG8EcBcPx3QGhJoJPoV92GT1OMXUpj9w+fUeU3Ns5Dom6UmKW1PWYYnD7AVW tYIUaMZUKPShQ3cXwuyEuceZaeqvSFtW8uWdOnBYMvIsWPzPT1am5KOHONQUodLO YMBTHLs7d29cTHvZH3ZjifDb+2bqFy/3kCUSzYZZnhd0GZQhyyzP2Vbu/5wodmkc hbhqWIF886/jHOOmY2QjvHRRDnfees6Ja8hu35zICeBSKDHIKuEwh8xNSEJHsMhh JA23m1GtZeADbnApo8V5IIbcpQ8uXoyCGAlwsNsP86n7QEq4geryG54g3Acf97Ba vxUQ1gj8DlhsJZb/RadB+LjZ464yfKEedp+9UNnASMPz3K5fxyke+LxO8fGpyEQv /a+7hloOlCYrFWLrGr9e =3HYv -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3aa653c6-c9c4-9ea2-bd44-23665e658214%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.