Sponsored Content
Full Discussion: Decryption software
Top Forums UNIX for Dummies Questions & Answers Decryption software Post 13979 by PxT on Friday 25th of January 2002 05:24:01 PM
Old 01-25-2002
Unix passwords cannot be "decrypted". Instead you must encrypt the plaintext and then compare it to the value stored in the password file. There are several password crackers freely available on the net which will attempt to brute-force a password.

Why don't you just pick a password that is easier to remember, or write it down somewhere safe. (Under your keyboard is not safe!) -- remember to never store your login name and password, or hostname and password in the same place.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File Encryption and Decryption in UNIX.

Hello guys ! I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course. Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan. But when... (3 Replies)
Discussion started by: abidmalik
3 Replies

2. UNIX for Advanced & Expert Users

decryption using digital certificate

A client application is encrypting a text using private key and sends through socket. My application(server written in c/c++,unix) receives the chiper-text through socket. I have client's digital certificate. now, how do I decrypt(may be using openssl library) this ciper-text using client's... (1 Reply)
Discussion started by: johnbach
1 Replies

3. Shell Programming and Scripting

Password decryption

Hi, I don't know if I am in a correct category with my question. I want to know what decryption-method is used for this password: (1) The first stadium is (its stored in the settings.xml of my software):... (2 Replies)
Discussion started by: Mogli1977
2 Replies

4. Shell Programming and Scripting

decryption issue!

Hi, Something bizarre is happening while decrypting the files. I had a decrypt script which was working smoothly on uname -a Linux ######### 2.6.9-89.ELsmp #1 SMP Mon Apr 20 10:33:05 EDT 2009 x86_64 x86_64 x86_64 GNU/Linux After the front-end application was moved to uname -a Linux... (2 Replies)
Discussion started by: dips_ag
2 Replies

5. Shell Programming and Scripting

unix Script for decryption

how to decrypt a file using unix Scipts . i am using one code that is working in the manual testing... echo $pass_phrase|gpg --output $filename_DEx --batch --passphrase-fd 0 --decrypt $filename_DEx_enc in the informatica level its not working.. can anybody help me in this? thanks... (1 Reply)
Discussion started by: rajesh_pola
1 Replies

6. Programming

Write own decryption application

Hi , I need some help as I dont know where to start. I need to create a unix decryption application. The information I have been given is this so far: the specification of the encryption process is: NET 2 Cryptography classes. RijndaelManaged encryption algorithm ... (13 Replies)
Discussion started by: caciing_help
13 Replies

7. UNIX for Dummies Questions & Answers

decryption of .cpt file

Hi i have the path for encrytion file in unix and i want to decrypt the .cpt file in unix and change the password how can i do that . (3 Replies)
Discussion started by: lily
3 Replies

8. Shell Programming and Scripting

String encryption and decryption

Hello All, There are so many questions on this and I didn't find any concluded answer. I want to encrypt a string in the script, actually this is a password. I tried using openssl (I am a newbie to openssl), but it is generating a long one which we can't remember. I want to encrypt the... (5 Replies)
Discussion started by: karumudi7
5 Replies

9. HP-UX

Decryption of files on HP-UX servers?

I am pulling a file from sfdc to HP-UX servers. But in HP-UX servers, the file data shows encrypted. Can anyone tell me how to decrypt them? The file data is like- ... (1 Reply)
Discussion started by: saga20
1 Replies
des(1)								   User Commands							    des(1)

NAME
des - encrypt or decrypt data using Data Encryption Standard SYNOPSIS
des -e | -d [-bfs] [-k key] [input-file [output-file]] DESCRIPTION
des encrypts and decrypts data using the NBS Data Encryption Standard algorithm. One of -e (for encrypt) or -d (for decrypt) must be spec- ified. The des command is provided to promote secure exchange of data in a standard fashion. Two standard encryption modes are supported by the des program, Cipher Block Chaining (CBC -- the default) and Electronic Code Book (ECB -- specified with -b). CBC mode treats an entire file as a unit of encryption, that is, if insertions or deletions are made to the encrypted file then decryption will not succeed. CBC mode also ensures that regularities in clear data do not appear in the encrypted data. ECB mode treats each 8 bytes as units of encryptions, so if parts of the encrypted file are modified then other parts may still be decrypted. Iden- tical values of clear text encrypt to identical values of cipher text. The key used for the DES algorithm is obtained by prompting the user unless the `-k key' option is given. If the key is an argument to the des command, it is potentially visible to users executing ps(1) or a derivative. To minimize this possibility, des takes care to destroy the key argument immediately upon entry. The des command attempts to use DES hardware for its job, but will use a software implementation of the DES algorithm if the hardware is unavailable. Normally, a warning message is printed if the DES hardware is unavailable since the software is only about 1/50th as fast. However, the -f option will suppress the warning. The -s option may be used to force use of software instead of hardware DES. The des command reads from standard input unless input-file is specified and writes to standard output unless output-file is given. The following sections give information required to implement compatible facilities in other environments. Since the CBC and ECB modes of DES require units of 8 bytes to be encrypted, files being encrypted by the des command have 1 to 8 bytes appended to them to cause them to be a multiple of 8 bytes. The last byte, when decrypted, gives the number of bytes (0 to 7) which are to be saved of the last 8 bytes. The other bytes of those appended to the input are randomized before encryption. If, when decrypting, the last byte is not in the range of 0 to 7 then either the encrypted file has been corrupted or an incorrect key was provided for decryption and an error message is printed. The DES algorithm requires an 8 byte key whose low order bits are assumed to be odd-parity bits. The ASCII key supplied by the user is zero padded to 8 bytes and the high order bits are set to be odd-parity bits. The DES algorithm then ignores the low bit of each ASCII character, but that bit's information has been preserved in the high bit due to the parity. The CBC mode of operation always uses an initial value of all zeros for the initialization vector, so the first 8 bytes of a file are encrypted the same whether in CBC or ECB mode. OPTIONS
-b Select ECB (eight bytes at a time) encryption mode. -d Decrypt data. -e Encrypt data. -f Suppress warning message when software implementation is used. -s Select software implementation for the encryption algorithm. -kkey Use the encryption key specified. FILES
/dev/des? SEE ALSO
ps(1) BUGS
It would be better to use a real 56-bit key rather than an ASCII-based 56-bit pattern. Knowing that the key was derived from ASCII radi- cally reduces the time necessary for a brute-force cryptographic attack. SunOS 5.11 3 Mar 2008 des(1)
All times are GMT -4. The time now is 05:23 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy