Follow

question: I'm building a project that deduplicates stored data chunks. Chunks are encrypted using their own hash as the key. For this to not break deduplication, I think the IV needs to be deterministic?

What security properties am I losing by doing this, and is there a better way (that does not involve "just use ZFS" or similar)?

· · Web · 1 · 0 · 0
Sign in to participate in the conversation
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.