>________________________________ > From: Roberto Spadim <robe...@spadim.com.br> >To: Unga <unga...@yahoo.com> >Cc: "openssl-users@openssl.org" <openssl-users@openssl.org> >Sent: Saturday, August 17, 2013 6:14 AM >Subject: Re: How to securely encrypt identical files to identical ciphertext? > > > >hum, i will talk again with general cases, but it give nice ideas.... > > >the point about security is fisic access... >you have problem with fisic access to disk? for example, if you put your data >in a datacenter, you never know who is changing your hardware or what happen >to hardware disks... at least i don't see anyone putting webcams outside the >server and record everything that happen outside server... >in this case you should check that datacenter admin can copy your disk and do >what he/she want... (it have the fisic acces to it, and yes it CAN do this, ok >maybe it's illegal, but what ever... it can do it) > > >when someone have a file for example 10MB, encrypted it will try data >dictionary, and brute force attacks, probably it will load the file to memory >and send to many computers to decode this file... 10MB in a memory is >something very small run memtest86+ in your computer... you will see >2GB/s of >speed on memory access... with many computers 10MB could be near to 1byte >(talking about read speed and decode speed)... well just to explain the >relative size when using many computers not true values... > > >well you can't do nothing, with time he/she will get the file... the only >solution is legal... but he/she can send your files over internet and anyone >could get it... > > >but... you have some alternatives... make attacker job harder >one nice feature is a "pseudo cryptografy" called steganography, instead of a >cryptography where attackers know that a file is crypted, you 'give' a file >that any users could see (for example a image or a music or a video) and add >your information in that file like a water mark... i didn't searched about >filesystems tools (for example using LUFS) to steganography files online... >but it's a nice feature for high security systems... the attacker will think >that it have the file, and it have the file, but it will think that the >information is a image, while the information is the watermarks in the >image... it's very very nice for security since the inteligence of attacker is >get a well know file format, and not a specific information, the specific >information is only searched if the attacker really know that you have >important information and the kind of information (for example instead of >finding a file, it will try to find text, and know that is possible to have a steganography software running in your filesystem), but again... with time attacker can get the information... > > >well getting back to plain salt... yes it's not as secure as a non blank salt, >i will talk about my idea of statistic in this case, not as a probability >model... maybe the attacker could use your salt at first time... maybe not... >the salt must be something that you probably will not use and attacker will >not think (or calculate) it too soon, again with time it can calculate... but >you should give your best to make it too hard to calculate or think that it >could be used, the blank salt is something that every body will try at first >time (at least me... i will try blank, 1234, 12345,1234567, 9999, 8888 ... and >others number combinations) > > >well when someone stole your data you can't do nothing, the best method is >physical protection, burn your disk for example like 007 james bond :) > > > >again, i didn't know if i solved your question, just some ideas about increase >security... > > >if you really want know if your system is secure, the most interesting thing >you could do is know some underground group and tell they to unlock your >information, there's some companies that do this job too, but underground >world is nice and many times free =] > > >good luck :) > >
Thanks, you gave an important idea. Lets try how easy to unlock :) Unga ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org