NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Hawk321
Oct 01, 2019Apprentice
readynas rn102 copy internal from c: to d: slow
Hello, Iam copying a big amount of data (6TB) from my c: hdd to the d: hdd. First I tried it with Total Commander and mounted therefore the c:/d: als network drivers. I got speeds between 10 mb...
StephenB
Oct 01, 2019Guru - Experienced User
Hawk321 wrote:
Iam not sure if this is the right way to test dd on different disks ? Maybe it will always test it on the same disk?
/root is actually a RAID-1 array of the two disks. The writes are going to both drives in parallel.
Hawk321 wrote:
C: 1073741824 bytes (1.1 GB, 1.0 GiB) copied, 3529.05 s, 304 kB/s D: 1073741824 bytes (1.1 GB, 1.0 GiB) copied, 17.5555 s, 61.2 MB/sI ran it now on C: and D:. C: is the encrypted HDD and is much slower!
Yikes. It will go faster w/o the oflag=direct flag, so maybe retest without that.
But the answer is pretty clear - disk encryption does kill the performance on the RN100
Hawk321
Oct 01, 2019Apprentice
root@BIGBUBUJR:/# dd if=/dev/zero of=/C/testfile bs=512k count=2048 2048+0 records in 2048+0 records out 1073741824 bytes (1.1 GB, 1.0 GiB) copied, 92.0958 s, 11.7 MB/s
This is without direct flag and simlilar to the speed I get with total comander. So it does kill the speed by 50 MB/s. Damn this is around 80% speed loss.
Will be AES 256 be similar slow as AES 512?
- StephenBOct 01, 2019Guru - Experienced User
Hawk321 wrote:
Will be AES 256 be similar slow as AES 512?I'd expect it to be somewhat faster, but I really don't know, since I don't use the encryption feature.
- Hawk321Oct 01, 2019ApprenticeFrom stackexchange:
For practical purposes, 128-bit keys are sufficient to ensure security. The larger key sizes exist mostly to satisfy some US military regulations which call for the existence of several distinct "security levels", regardless of whether breaking the lowest level is already far beyond existing technology.
The larger key sizes imply some CPU overhead (+20% for a 192-bit key, +40% for a 256-bit key: internally, the AES is a sequence of "rounds" and the AES standard says that there shall be 10, 12 or 14 rounds, for a 128-bit, 192-bit or 256-bit key, respectively). So there is some rational reason not to use a larger than necessary key.
A larger key size also resists better to large quantum computer attacks: Using Grover's algorithm, a brute-force attack on any k-bit key block cipher would only take đ(2đ/2)
O
(
2
k
/
2
)
steps, so a 256-bit key would still give 128-bit security, while a 128-bit key could be cracked in 2^64 operations, which is doable. But as far as I know, the threat of QC was an ulterior rationalization; also, it does not explain the 192-bit key size. (And quantum computers of this size are not yet in sight for the next some years.)- Hawk321Oct 01, 2019Apprentice
So ReadyNas always decrypts with AES 256 so no chance to use another decryption standard.
I couldnt find the mounted drives with VeraCrypt but I know that people used Veracrypt to decrypt ReadNas Disks.
Any idear how?
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!