[Fed-Talk] More encryption questions
[Fed-Talk] More encryption questions
- Subject: [Fed-Talk] More encryption questions
- From: Michael Pike <email@hidden>
- Date: Mon, 26 Sep 2005 13:20:34 -0600
Hello all:
First, thanks to whoever it was for giving me that detailed analysis
of the AES128 encryption algorithm. It seems to me the cipher is
probably pretty strong, and the only potential weak area may be with
the way OS X generates the keys for FILE VAULT.
Here is my second (and third question):
If I make an encrypted DRIVE IMAGE (through Disk Utility), does it use
my passphrase as the decryption key, or does it use a randomly
generated key and wrap it with the OS X keychain item (in the same
manner FileVault does).
Secondly: (This is to Apple): Is there a "master key" implemented
that will allow decryption of the FileVault and/or encrypted drive
image by either private or governmental agencies?
I'm not sure if the encryption engines and key generators are open
source through OS X, or if it is a closed part of the system.
Based on the answers to this, I will take two encrypted drive images
generated on different machines with different data (both FileVault
created as well as Disk Utility created), and run them through various
utilities to look at the byte level of each file and see if any
pattern is duplicated in either image. If I do not find any, I will
be satisfied that there are no back doors :) Although, I am still
partial and will use BlowFish 448 (but will use it to encrypt the
AES128 encrypted drive image :)
Mike
--
"I never loved email, until I found GMail." - Mike Pike, 2005
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden