AIX dropping crypt surprised me too. Using standard AIX software, no, I do not believe there is a way to password encrypt a file. However, you can compile/install OpenSSL available from http://www.openssl.org
There are oodles of encryption algorithms and encrypting a file is quite simple.
To decrypt, simply swap your -in and -out file parameters and add a -d to the command line:
How to set password in zip files under unix?
There are password protection available in various os.
Does unix has password protection for zip files?
Is zip and gzip command has it? (6 Replies)
Hi Experts,
I am an SAP ABAP developer and compleatly stranger to unix and I need a help to extend a small peice of code.
Our requirement is to zip a file with password protection in a specified directory. Following is the code I am using to zip a file ZZZZ.TXT.
Here YYYY = is the path... (3 Replies)
I am trying to zip a file with password protection.
I have read all or atleast most of the threads on the website, but couldn't come up with a solution.
I am running ZIP version 2.3 on HP-UX but I dont see the -P (password) option. I read somewhere that free versions of zip don't come with... (5 Replies)
Hi Friends,
I execute a perl script with password as input but i wish not to print the password when i give the input. Instead when i provide the password it could be shown as "****" instead of original password. I know we can use Term::ReadKey or IO::Prompt for this, but just wanted to know if... (0 Replies)
HI,
Can we add password protection for attachment of .CSV file in below command or any alternative solution.
uuencode ../reports/gtsa_lmt_pb_rfs_daily.txt gtsa_lmt_pb_rfs_daily-$FILDTE.csv |mailx -s "gtsa_lmt_pb_rfs_daily" $MAILTO
Many thanks
regards,
Sampath (4 Replies)
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Hi Gurus,
I need to encrypt the Db passwords which are stored in a configuration file (.txt) as below:
stage_db_pwd=ABC
this is test line
content_db_pwd=123def
This is test line 2
stg_db_name=xyz
I want to encrypt all the password fields (identified by "pwd"), encrypt them in the same... (3 Replies)
Discussion started by: ashishpanchal85
3 Replies
9. Post Here to Contact Site Administrators and Moderators
All,
I have requirement to send password protected excel file in an email from unix/linux box without zipping it. Any help would be appreciated.
Thanks.. (1 Reply)
All,
I have requirement to send password protected excel file in an email from unix/linux box without zipping it. Any help would be appreciated.
Thanks.. (8 Replies)
Discussion started by: Durgesh Gupta
8 Replies
LEARN ABOUT XFREE86
crypt
crypt(1)crypt(1)NAME
crypt - encode or decode a file
SYNOPSIS
crypt [password]
The crypt utility encrypts and decrypts the contents of a file. crypt reads from the standard input and writes on the standard output. The
password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off
printing while the key is being typed in. crypt encrypts and decrypts with the same key:
example% crypt key < clear.file > encrypted.file
example% crypt key < encrypted.file | pr
prints the contents of clear.file.
Files encrypted by crypt are compatible with those treated by the editors ed(1), ex(1), and vi(1) in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space
must be infeasible; "sneak paths" by which keys or cleartext can become visible must be minimized.
crypt implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on
such machines are widely known, thus crypt provides minimal security.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, that is, to take a substan-
tial fraction of a second to compute. However, if keys are restricted to (say) three lower-case letters, then encrypted files can be read
by expending only a substantial fraction of five minutes of machine time.
Since the key is an argument to the crypt command, it is potentially visible to users executing ps(1) or a derivative command. To minimize
this possibility, crypt takes care to destroy any record of the key immediately upon entry. No doubt the choice of keys and key security
are the most vulnerable aspect of crypt.
/dev/tty for typed key
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
des(1), ed(1), ex(1), ps(1), vi(1), attributes (5)
8 Mar 2005 crypt(1)