[Info-vax] Current state of file/disk encryption on VMS

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Fri Sep 2 19:31:34 EDT 2022


On 2022-09-02 21:26:26 +0000, Alexander Schreiber said:

> Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>> On 2022-09-01 20:45:30 +0000, Alexander Schreiber said:
>> 
>>> Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>>>> 
>>>> If BACKUP is encrypting data before performing data compression, that's 
>>>> a design bug in BACKUP.
>>> 
>>> Well, that is actually the right thing do to from a crypto security 
>>> point of view. Compressed files tend to have specified headers and 
>>> structures, which means that "compress, then encrypt" potentially 
>>> enables a nice automatic known plaintext attack. And I suspect that is 
>>> the reason it was done this way.
>> 
>> If your chosen encryption reveals your plaintext, your encryption needs 
>> help. Whether ghostly penguins, or otherwise.
> 
> *sigh*
> 
> That is _not_ what "know plaintext attack" means. It means you have the 
> encrypted message and somehow, through other means, got (part) of the 
> plaintext. E.g. in WW2 ciphers where broken by this because the used 
> (known) standard headers and known standard text in known
> places (e.g. standard greeting of "Heil Hitler" - now run the brute 
> forcer until it finds a key that makes the ciphertext decrypt to that).
> 
> With modern fileformats, standard headers serve this role - e.g. if you 
> know that you have an encrypted JPEG image, you know that the plaintext 
> has a certain header structure (in this case, including the string 
> "JFIF") you have some help ;-)
> 
> One way to guard against this (as has been pointed out elsewhere in 
> this thread) is to use proper encryption algorithms and protocols (e.g. 
> AES with random IV in CBC mode), correctly implemented.

The "ghostly penguins" was a reference to a famous example of the 
foibles of using AES-ECB using an image of the Linux penguin.

The plaintext references in my reply were to recovering the data, and 
not to a known-plaintext attack.

Attempting data compression after data encryption is somewhere in the 
range of futile, unnecessary, and resource-wasteful.

And if data compression performed after data encryption does provide a 
substantial storage savings, your chosen encryption algorithm is 
suspect.

More generally, the OpenVMS APIs here are either not helpful or wholly 
missing, whether with how BACKUP mis-sequences here, or more generally 
around API designs for data protection and network connection security 
that are inherently prone to errors.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list