this post was submitted on 15 Mar 2024
15 points (89.5% liked)

Privacy

31798 readers
266 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I was looking for a multi-OS file encrypter, for a single solution, and found this one: https://paranoiaworks.mobi/sse/pro_version_features.html

The pro version says, "You get new algorithms: Threefish 1024bit, SHACAL-2 512bit and Paranoia C4 2048bit (which is a cascade of Threefish–Serpent–AES–SHACAL2)."

Any real benefit to a multiple encryption scheme of 4 different ciphers for that 3rd algo? Just seems like it could increase the likelihood of introducing more possible vulns and/or more susceptible to cryptanalysis

top 4 comments
sorted by: hot top controversial new old
[–] sugar_in_your_tea@sh.itjust.works 9 points 7 months ago (1 children)

The main benefit is that all the ciphers need to be broken to compromise the data. So as long as each of the ciphers are strong, you'll get a little better security.

The main downside is additional computational complexity. Most disk encryption systems have minimal performance impact because the CPU has hardware acceleration for popular ciphers, so it can keep up with disk reads. Both of my computers use full disk encryption, and the system runs plenty fast. If you run multiple ciphers, you're more likely to notice the decryption process.

The likelihood of any strong cipher being broken is incredibly low, and it's much more likely that an attacker will compromise the data while it's unencrypted than attacking the cipher directly, in which case the cascading cipher won't help.

If you want paranoid levels of security, consider following the NSA's Rule of Two, which means two completely independent layers of encryption. Don't use two ciphers from the same vendor, but two vendors. For example, use full disk encryption through the OS, and an encryption application for important files. If you use two ciphers from the same vendor (i.e. your application with cascading ciphers), it's more likely that they would share a vulnerability than if they came from different vendors.

[–] glowie@h4x0r.host 2 points 7 months ago

Ah, good idea using multiple vendors, thank you

[–] Pfosten@feddit.de 4 points 7 months ago (1 children)

There is no downside to nested encryption, except of course the performance overhead. But this only really makes sense if each layer has an independent key and each layer uses an algorithm from a different family. Improper key reuse weakens the scheme.

For symmetric cryptography like AES the benefit is dubious. It is far more likely that the content is decrypted because the key was acquired independently than that AES would be broken.

However, there absolutely is a benefit for asymmetric crypto and key agreement schemes. This is how current Post-Quantum Cryptography schemes work, because:

  • commonly used algorithm families like RSA and Elliptic-Cuve will be broken as soon as a sufficiently large quantum computer exist
  • proposed PQC algorithms are comparatively immature, and some of them will be broken in the near future

Nesting one algorithm from each family gives us the best of both worlds, at a performance overhead: conventional asymmetric cryptography give us temporary security in the near future, and the second PQC layer gives us a chance at long-term security.

[–] glowie@h4x0r.host 1 points 7 months ago

Great, thank you, appreciate your thorough explanation