[Info-vax] Current state of file/disk encryption on VMS

Alexander Schreiber als at usenet.thangorodrim.de
Sat Sep 3 17:22:17 EDT 2022


Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
> On 2022-09-02 21:26:26 +0000, Alexander Schreiber said:
>
>> Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>>> On 2022-09-01 20:45:30 +0000, Alexander Schreiber said:
>>> 
>>>> Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>>>>> 
>>>>> If BACKUP is encrypting data before performing data compression, that's 
>>>>> a design bug in BACKUP.
>>>> 
>>>> Well, that is actually the right thing do to from a crypto security 
>>>> point of view. Compressed files tend to have specified headers and 
>>>> structures, which means that "compress, then encrypt" potentially 
>>>> enables a nice automatic known plaintext attack. And I suspect that is 
>>>> the reason it was done this way.
>>> 
>>> If your chosen encryption reveals your plaintext, your encryption needs 
>>> help. Whether ghostly penguins, or otherwise.
>> 
>> *sigh*
>> 
>> That is _not_ what "know plaintext attack" means. It means you have the 
>> encrypted message and somehow, through other means, got (part) of the 
>> plaintext. E.g. in WW2 ciphers where broken by this because the used 
>> (known) standard headers and known standard text in known
>> places (e.g. standard greeting of "Heil Hitler" - now run the brute 
>> forcer until it finds a key that makes the ciphertext decrypt to that).
>> 
>> With modern fileformats, standard headers serve this role - e.g. if you 
>> know that you have an encrypted JPEG image, you know that the plaintext 
>> has a certain header structure (in this case, including the string 
>> "JFIF") you have some help ;-)
>> 
>> One way to guard against this (as has been pointed out elsewhere in 
>> this thread) is to use proper encryption algorithms and protocols (e.g. 
>> AES with random IV in CBC mode), correctly implemented.
>
> The "ghostly penguins" was a reference to a famous example of the 
> foibles of using AES-ECB using an image of the Linux penguin.

Anyone using ECB without a _very_, _very_ good excuse needs to go
back to Crypto 101.

> Attempting data compression after data encryption is somewhere in the 
> range of futile, unnecessary, and resource-wasteful.

It's a waste of time and CPU cycles, yes.

> And if data compression performed after data encryption does provide a 
> substantial storage savings, your chosen encryption algorithm is 
> suspect.

Indeed.

> More generally, the OpenVMS APIs here are either not helpful or wholly 
> missing, whether with how BACKUP mis-sequences here, or more generally 
> around API designs for data protection and network connection security 
> that are inherently prone to errors.

I suspect that a lot of those design decisions where made in more
innocent times.

Kind regards,
          Alex.
-- 
"Opportunity is missed by most people because it is dressed in overalls and
 looks like work."                                      -- Thomas A. Edison



More information about the Info-vax mailing list