List Archive: gentoo-security
Note: Due to technical difficulties, the Archives are currently not up to date.
provides an alternative service for most mailing lists.c.f. bug 424647
I just did some benchmarking on different ciphers for cryptsetup-luks
and now I've got some questions:
1. Is it a valid way to benchmark by using "time dd if=/dev/zero
of=/dev/mapper/cryptmapping -bs=1M"? The results seem to match other
benchmarks but I just want to be sure.
2. I've tested every (sensible) cipher with 64, 128, 256 and 320bits
keysize (if supported). Apparently I can choose between:
These are settings on which my harddisk limits transfer speed, not the
Surprisingly, Anubis is faster with 320bits than Blowfish with the same
setting (Blowfish: 32MB/s, Anubis 37MB/s, hdparm -tT 38MB/s). Do you
think keysize is more important than choosing a cipher which made it
further in the AES-contest and therefore using Anubis with 320bit would
be a better choice than AES or Twofish with 256bit? Might it even be an
advantage because less people try to brake Anubis than AES (although it
bears some similarity with AES and might be vulnerable to the same
And if I need a faster cipher, do you think Blowfish with 64bit keys is
save for the next 3 years?
Thanks in advance!
signature.asc (This is a digitally signed message part)