m-dogg said:
Can you put an encrypted disc image inside another encrypted disc image? So even if they (whoever 'they' are) managed to crack your image, they'd open it up to find yet another encrypted image inside of it?
Some of this is confusing to me - Let's say I use one of these with a ~40 character password consisting of a mix of capital, lowercase & numeric characters. What is the estimated time to crack such a password?
If you chose those 40 characters in an entirely random manner, you would get the type of security they were talking about in Diatribe's link.
Capital, lowercase & numeric characters counts up to 26+26+10 = 62 different characters to choose from. To find how many bits of security that is, solve the equation 2^x = 62 => x = ln 62 / ln 2 = 5.954 bits.
40 characters gives 40 * 5.954 = 238.16 bits security. That's much stronger than the 128 bits security of the encryption scheme, so it's overkill, because the attacker can go after the encryption key instead of the password.
However, if the 40 characters aren't chosen entirely randomly, the security falls dramatically against an attacker with a sophisticated linguistics based password cracker machine. Like I said in a previous post, if the password is language based but has some numbers and special characters intermixed, you can reach an entropy of 5 bits per character.
40 characters then gives 40 * 5 = 200 bits of security. That's still plenty.
If your password is entirely normal english language, the entropy is less than 2 bits per character.
40 characters then gives less than 40 * 2 = 80 bits of security. That is still a lot, but now the password is the weakest link.
To calculate how long it takes to break the password, estimate how many passwords a computer can test per second. Diatribe's link suggests somewhere between 10 and 100 million passwords can be hashed in one second, but in this case, the hash value must also be used to initialise an AES key and test decrypt a block of the disk image, so a normal computer can do about 1 million tests per second.
1 million tests ≈ 2^20 tests
1 year = 60*60*24*365 secs = 31536000 ≈ 2^25
The 40 character pure english password takes less than
2^80 / 2^20 / 2^25 = 2^(80-20-25) = 2^35 = 34 359 738 368
years to break on a normal computer using a sophisticated linguistics based attack.