Re: [ADMIN] Secure DB Systems - How to

From: Bruno Wolff III <bruno(at)wolff(dot)to>
To: Daniel Struck <struck(dot)d(at)retrovirology(dot)lu>
Cc: Greg Stark <gsstark(at)mit(dot)edu>, Mitch Pirtle <mitchy(at)spacemonkeylabs(dot)com>, pgsql-php(at)postgresql(dot)org
Subject: Re: [ADMIN] Secure DB Systems - How to
Date: 2004-07-30 15:30:49
Message-ID: 20040730153049.GA14646@wolff.to
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgadmin-support pgsql-admin pgsql-hackers-win32 pgsql-php pgsql-sql

On Fri, Jul 30, 2004 at 11:43:31 +0200,
Daniel Struck <struck(dot)d(at)retrovirology(dot)lu> wrote:
> > IVs act to make the key appear longer. This is especially useful when humans
> > are picking passphrases that are used to generate the key. If you control
> > what the actual keys are, then you can make dictionary attacks impractical.
> > However, there still would be the problem that identical items in the
> > database would be identical. Which, depnding on your application, might
> > be a problem because of information leakage.

I should have stated the above a bit differently. IVs are probably more used
to prevent the information leakage from have the same plain text encode
to the same cipher text when using the same, then for protecting users from
using poorly chosen keys.

> I don't think this is true for CBC mode. Here the first block of plaintext is XORed with the IV then encrypted with a block ciper like AES for example. The next plaintext block is than XORed with the previous cyphertext and so on.

In the context of records in a database you aren't (at least not normally)
going to treat multiple records as part of the same cipher stream, so that
using various types of block chaining over say a whole table isn't going to
happen.

> In my application I do use a different IV for every encrypted plaintext:

That is certainly a reasonable approach, though there may be cases where
it is useful to trade some information leakage for the ability to use
indexes while doing all decryption on the client.

In response to

Browse pgadmin-support by date

  From Date Subject
Next Message Michael Eschweiler 2004-08-01 11:26:20 Compiling pgadmin on SuSE 9.1
Previous Message Daniel Struck 2004-07-30 09:43:31 Re: [ADMIN] Secure DB Systems - How to

Browse pgsql-admin by date

  From Date Subject
Next Message Uwe C. Schroeder 2004-07-30 17:01:48 Re: ERROR Urgent
Previous Message Goulet, Dick 2004-07-30 14:09:42 Re: How can i start up POSTMASTER from unprivilege account

Browse pgsql-hackers-win32 by date

  From Date Subject
Next Message Bruce Momjian 2004-07-31 05:51:09 Re: [HACKERS] Cannot initdb in cvs tip
Previous Message Andreas Pflug 2004-07-30 14:37:09 Re: stderr piping under win32

Browse pgsql-php by date

  From Date Subject
Next Message reiner peterke 2004-07-30 16:05:06 Re: [0.0] Re: [0.2] getting transactions to work
Previous Message bruce 2004-07-30 15:21:14 Re: [0.2] getting transactions to work

Browse pgsql-sql by date

  From Date Subject
Next Message Ray Aspeitia 2004-07-30 18:46:36 How to create an aggregate?
Previous Message Daniel Struck 2004-07-30 09:43:31 Re: [ADMIN] Secure DB Systems - How to