kriswebdev / cryptsetup-deluks

Cryptsetup with Deniable LUKS header crypto extension 🇺🇦 SUPPORT UKRAINE! 🇺🇦
GNU General Public License v2.0
64 stars 5 forks source link

Evolutive protection against brute-forcing #2

Open kriswebdev opened 7 years ago

kriswebdev commented 7 years ago

As computing power grows in time and new exploits are discovered, it may be necessary to:

The difficulty, when using deniable encryption, is that those header encryption settings cannot be stored with the deniable payload, or they wouldn't be deniable. However, they can be given by the user as arguments each time the volume is decrypted, or must be stored/hard-coded in the executable as default settings.

The second solution is the most practical, and that's what Truecrypt does: it stores a long list of hash algorithm+cipher+keysize+etc. mix and tries them all. But as Truecrypt has to run on most machines, even the ones with limited computing power, it unnecessarily weakens the header encryption settings so that it doesn't take forever to open a Truecrypt volume on an weak machine.

On the other hand, LUKS uses by default:

I believe that the best solution is to use by default:

One last remark is that nowadays, crackers tends to use GPU or even APU instead of CPU for brute-forcing. There are two challenges: