[144474] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Warning! New cryptographic modes!

daemon@ATHENA.MIT.EDU (Zooko Wilcox-O'Hearn)
Fri May 22 20:41:26 2009

In-Reply-To: <5e01c29a0905111727n148ca81fg89b09b569ca51f2c@mail.gmail.com>
Cc: Jerry Leichter <leichter@lrw.com>,
 Victor Duchovni <Victor.Duchovni@morganstanley.com>,
 Cryptography List <cryptography@metzdowd.com>
From: Zooko Wilcox-O'Hearn <zooko@zooko.com>
Date: Fri, 22 May 2009 14:38:06 -0600
To: michaelslists@gmail.com

For what it is worth, in the Tahoe-LAFS project [1] we simply use CTR  
mode and a unique key for each file.  Details: [2]

Tahoe-LAFS itself doesn't do any deltas, compression, etc., but there  
are two projects layered atop Tahoe to add such features -- a plugin  
for duplicity [3] and a new project named GridBackup [4].

Those upper layers can treat the Tahoe-LAFS as a secure store of  
whole files and therefore don't have to think about details like  
cipher modes of operation, nor do they even have to think very hard  
about key management, thanks to Tahoe-LAFS's convenient capability- 
based access control scheme.

Regards,

Zooko

[1] http://allmydata.org
[2] http://allmydata.org/trac/tahoe/browser/docs/architecture.txt
[3] http://duplicity.nongnu.org
[4] http://podcast.utos.org/index.php?id=52

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post