On Friday, August 21, 2015, Scott Morgan <bl...@blueyonder.co.uk> wrote:

>
> Q1 : 4, I don't expect NSA defeating crypto[0], but enough to keep
> casual eyes away from expensive data.
>
> Q2 : 5, It's a must. Whether the key is somehow held internal to the
> .FDB file (with it's own pswd, no system wide account access, naturally)
> or passed in via connection data, isn't an issue[1], but the DB must be
> available to the apps depending on it with zero user intervention.
>
> Scott
>
> [0] For deployment to sites out of our control, in the end there's no
> technical way to truly hide the data, obviously. But we're also not
> talking about skilled hackers either, just average users. Hell, XOR
> would probably suffice, but something like ChaCha would be preferred.
>
> [1] Although, would prefer things like GBAK, ISQL, etc. to still be usable.
>
>
ChaCha20 is a stream cipher that generates a pseudo random byte stream that
is XORed with the plaintext to form the ciphertext.  If the same initial
state (<key, nonce>) is used more than once, which is necessary to
re-encrypt a changed page, XORing two encrypted page image versions results
is the same as the XOR of the two plaintext page images.  From that and a
knowledge of Firebird page format, and security is blown.

This is not a reflection on ChaCha20, but just an example of tge dangers of
using a good algorithm inappropriately.


------------------------------------------------------------------------------
> Firebird-Devel mailing list, web interface at
> https://lists.sourceforge.net/lists/listinfo/firebird-devel
>


-- 
Jim Starkey
------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to