[Noisebridge-discuss] Full disk encryption - compare / contrast?

travis+ml-noisebridge at subspacefield.org travis+ml-noisebridge at subspacefield.org
Wed Oct 20 14:05:59 UTC 2010


On Tue, Oct 19, 2010 at 05:16:20PM -0400, weasel at meer.net wrote:
> there was a somewhat recent result about the aes key schedule w/  
> 256bit keys, but i'm not enough of a theorhetician to know how  
> problematic this is.
> 
>    http://eprint.iacr.org/2010/023.pdf

Differential fault analysis matters if:

1) Someone can make the device fail, physically, to perform operations
   properly (ex: glitching the power to, or microwaving, a smart card).

2) It's a problem if that person finds out the key (i.e. it's not
   theirs).

This is generally only the case with physical access by a person who
doesn't set the key - for example, in satellite TV cards, smart cards,
DRM, and when deploying an encryption device to a forward location on
the battlefield.

I think you're talking about this?

http://www.schneier.com/blog/archives/2009/07/another_new_aes.html
http://eprint.iacr.org/2009/374
-- 
"With my finger on the trigger, I run ./configure" -- Monzy, "kill -9"
My emails do not have attachments; it's a digital signature that your mail
program doesn't understand. | http://www.subspacefield.org/~travis/ 
If you are a spammer, please email john at subspacefield.org to get blacklisted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20101020/995ffc8d/attachment-0003.sig>


More information about the Noisebridge-discuss mailing list