LUKS List available methods of encryption for LUKS

$ cryptsetup benchmark
# Tests are approximate using memory only (no storage IO).
PBKDF2-sha1       292752 iterations per second
PBKDF2-sha256     221362 iterations per second
PBKDF2-sha512     142010 iterations per second
PBKDF2-ripemd160  277124 iterations per second
PBKDF2-whirlpool  155727 iterations per second
#  Algorithm | Key |  Encryption |  Decryption
     aes-cbc   128b   164.7 MiB/s   164.5 MiB/s
 serpent-cbc   128b   119.5 MiB/s   205.0 MiB/s
 twofish-cbc   128b   163.5 MiB/s   208.6 MiB/s
     aes-cbc   256b   148.4 MiB/s   147.9 MiB/s
 serpent-cbc   256b   128.1 MiB/s   205.3 MiB/s
 twofish-cbc   256b   202.3 MiB/s   213.1 MiB/s
     aes-xts   256b   165.4 MiB/s   145.3 MiB/s
 serpent-xts   256b   150.0 MiB/s   194.5 MiB/s
 twofish-xts   256b   206.4 MiB/s   206.9 MiB/s
     aes-xts   512b   149.4 MiB/s   147.5 MiB/s
 serpent-xts   512b   181.7 MiB/s   195.0 MiB/s
 twofish-xts   512b   207.1 MiB/s   208.6 MiB/s

$ cryptsetup --help|tail -n 8
Default compiled-in key and passphrase parameters:
    Maximum keyfile size: 8192kB, Maximum interactive passphrase length 512 (characters)
Default PBKDF2 iteration time for LUKS: 1000 (ms)

Default compiled-in device cipher parameters:
    loop-AES: aes, Key 256 bits
    plain: aes-cbc-essiv:sha256, Key: 256 bits, Password hashing: ripemd160
    LUKS1: aes-xts-plain64, Key: 256 bits, LUKS header hashing: sha1, RNG: /dev/urandom

--key-size, -s <bits>
          Sets  key  size in bits. The argument has to be a multiple of 8.
          The possible key-sizes are limited by the cipher and mode used.

          See /proc/crypto for more information.  Note  that  key-size  in
          /proc/crypto is stated in bytes.
 
cryptsetup status /dev/mapper/sda5_crypt

Your output will be similar to this:

 type: LUKS1
cipher:  aes-xts-plain64
keysize: 512 bits
device:  /dev/sda5
offset:  4096 sectors
size:    19972096 sectors
mode:    read/write
 
0 (0)
Article Rating (No Votes)
Rate this article
Attachments
There are no attachments for this article.
Comments
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
Deskshare TLS over Stunnel
Viewed 2525 times since Fri, Sep 28, 2018
How to remove CTRL-M (^M) characters from a file in Linux
Viewed 2078 times since Thu, Feb 7, 2019
An easier way to manage disk decryption at boot with Red Hat Enterprise Linux 7.5 using NBDE
Viewed 6867 times since Mon, Aug 6, 2018
Linux Customizing Bash
Viewed 1845 times since Sun, Dec 6, 2020
LVM: Reduce SWAP size by shrinking existing Logical Volume
Viewed 5789 times since Sat, Jun 2, 2018
RHEL7 slow ssh login
Viewed 4018 times since Tue, Aug 6, 2019
Installing and Configuring an OCFS2 Clustered File System
Viewed 5492 times since Sat, Jun 2, 2018
Odpalenie polecenia tylko na jedną godzinę
Viewed 2540 times since Thu, May 24, 2018
YUM CRON Enabling automatic updates in Centos 7 and RHEL 7
Viewed 11656 times since Fri, Oct 26, 2018
Linux Audit The Linux security blog about Auditing, Hardening, and Compliance lynis
Viewed 1756 times since Thu, Jan 16, 2020