Instead of answering your questions as asked, let me explain what it does.

It encrypts the file data.  It makes some effort at avoiding
watermarking attacks by use of an initialization vector, but this effort
is not robust in that file size is not encryptable without an
unacceptable cost in space utilization (to encrypt file size you must
store each of the files with a random amount of padding proportional to
the size of the largest file stored), and for that reason we do not
encrypt file size.  Edward, do you do some minor (and not crypto-secure)
amount of padding?  (I think he does.)

It does not encrypt the filenames.

I believe that if you want to encrypt file size you really want a deeply
different approach.

The problem with not encrypting file size is that you can figure out
whether someone is storing, say, the linux kernel, in their home
directory, by looking at file sizes, and if for every file in the tree
you have a match in file size, you can be pretty sure the linux kernel
is what it is.

So, our encryption is useful for protecting data whose contents are
unique, like your personal accounting, and not useful for data that are
widely known and stored in a tree of many files, like the linux kernel.

Now that I have answered the questions you did not ask, could you repeat
your email to me with the questions that you still want me to answer?

Future work for future reiser4's: multi-file compression and encryption
based on encrypting and compressing (enlarged) nodes not files. 
Alternately, compressing and encrypting whole directories rather than
files.  Note how if files are 100 bytes, you are motivated to make
compression be implemented using multiple files if you want good
compression.

Hans

John Gilmore wrote:

>I seem to recall several people saying that the compression/encryption plugins 
>will only encrypt items, and not the filesystems metadata. And then saying 
>that this might be useless for their purposes, because being able to see the 
>filename might be enough for the attacker.
>
>However, I don't think that is correct. The only thing visible to an attacker 
>would be the tree structure, not the item, which contains the directory 
>information including the filenames.
>
>So at most an attacker would be able to browse the tree structure, and see the 
>keys used and the size of the item pointed to. If this is true, selection of 
>a good hash should entirely prevent the giving information away problem, 
>leaving only useless key->size->location data for an attacker.
>
>Is my understanding correct?
>
>
>  
>

Reply via email to