From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261890AbTLJGHr (ORCPT ); Wed, 10 Dec 2003 01:07:47 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262051AbTLJGHr (ORCPT ); Wed, 10 Dec 2003 01:07:47 -0500 Received: from adsl173-178.dsl.uva.nl ([146.50.173.178]:22408 "EHLO hypnos.var.cx") by vger.kernel.org with ESMTP id S261890AbTLJGHq (ORCPT ); Wed, 10 Dec 2003 01:07:46 -0500 Date: Fri, 5 Dec 2003 18:28:06 +0100 From: Frank v Waveren To: J?rn Engel Cc: David Wagner , linux-kernel@vger.kernel.org Subject: Re: partially encrypted filesystem Message-ID: <20031205172806.GB15738@var.cx> References: <1070485676.4855.16.camel@nucleon> <20031204141725.GC7890@wohnheim.fh-wedel.de> <20031204172653.GA12516@wohnheim.fh-wedel.de> <20031205130202.GA31855@wohnheim.fh-wedel.de> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20031205130202.GA31855@wohnheim.fh-wedel.de> User-Agent: Mutt/1.5.4i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Dec 05, 2003 at 02:02:02PM +0100, J?rn Engel wrote: > How can you claim that modern cryptosystems are immune to known > plaintext attacks? Just as it's perfectly reasonable to say that factoring large prime products is computationally infeasible. True, it might turn out to be untrue, but it's one of the general assumptions you go by when implementing a cryptographic system. -- Frank v Waveren Fingerprint: 21A7 C7F3 fvw@[var.cx|stack.nl|dse.nl] ICQ#10074100 1FF3 47FF 545C CB53 Public key: hkp://wwwkeys.pgp.net/fvw@var.cx 7BD9 09C0 3AC1 6DF2