Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: suggest that the risk of high numbers of files in many situations is fine #99

Merged
merged 1 commit into from
Jan 7, 2024

Conversation

michalc
Copy link
Member

@michalc michalc commented Jan 7, 2024

https://crypto.stackexchange.com/questions/109293/keystream-reuse-in-aes-256-in-ae-2-encrypted-zips (which is my own question and answer) describes how the chance of leakage due to high number of member file in a ZIP is really low for AES-256.

So this adds that in - suggesting that the risk is probably acceptable for all situations other than the most risk averse that also have high numbers of member files in the ZIP. It doesn't put any figure or formulas in - I think people are going to have to investigate and make their own judgement calls. Essentially I think we want enough information for people to either:

  • "Oh - we are risk adverse, we need to look into this further"
  • "We are happy with a bit of risk - we're good"

Also - this removes the "as most other ZIP writer do" part when referring ot encrypting files with the same password. It I think it's borderline defensive, and not really that helpful here, and slightly muddies the message on risk and high numbers of files. Keeping the focus on what stream-zip does to really keep the most important information. If people want to investigate other ZIP writers, they can.

@michalc michalc force-pushed the docs/keystream-leakage-in-most-cases-acceptable branch 2 times, most recently from b442525 to 89a581b Compare January 7, 2024 10:59
…ns is fine

https://crypto.stackexchange.com/questions/109293/keystream-reuse-in-aes-256-in-ae-2-encrypted-zips
(which is my own question and answer), describes how the chance of leakage due
to high number of member file in a ZIP is really low for AES-256.

So this adds that in - suggesting that the risk is probably acceptable for all
situations other than the most risk averse that also have high numbers of
member files in the ZIP. It doesn't put any figure or formulas in - I think
people are going to have to investigate and make their own judgement calls.
Essentially I think we want enough information for people to either:

- "Oh - we are risk adverse, we need to look into this further"
- "We are happy with a bit of risk - we're good"

Also - this removes the "as most other ZIP writer do" part when referring ot
encrypting files with the same password. It I think it's borderline defensive,
and not really that helpful here, and slightly muddies the message on risk and
high numbers of files. Keeping the focus on what stream-zip does to really keep
the most important information. If people want to investigate other ZIP
writers, they can.
@michalc michalc force-pushed the docs/keystream-leakage-in-most-cases-acceptable branch from 89a581b to b170ce0 Compare January 7, 2024 11:02
@michalc michalc merged commit c54aeb7 into main Jan 7, 2024
5 checks passed
@michalc michalc deleted the docs/keystream-leakage-in-most-cases-acceptable branch January 7, 2024 11:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant