Sponsored Content
Operating Systems Linux Red Hat "SCRYPT" command in RED HAT 9 Post 302267706 by Perderabo on Saturday 13th of December 2008 01:26:41 PM
Old 12-13-2008
crypt is a very weak encryption program that should no longer be used. This was actually true 25 years ago. At this point, crypt is sadly obsolete. You need a strong encryption algorithm and one of the best currently available is AES-256. No one has broken it yet. The US government currently allows the use of AES-256 to protect Top Secret information.

I suggest that you use gpg to encrypt your file, but you must specify the encryption algorithm like this:

gpg -c --cipher-algo aes256 secret.txt

and to decrypt the file:

gpg secret.txt.gpg


GNU Privacy Guard, gpg, seems to simply come with our Linux systems. It is available on sunfreeware.com for Solaris. I also found a package for XP at the The GNU Privacy Guard - GnuPG.org site (navigate to the download page).
 

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Using "sed" to update RECURSIVELY a value within a directory in a Red Hat Machine

Hi All, I spent the whole morning trying to create a shell script ( using "sed" command ) that looks for a value in a directory and its sub directory than changes it with another value but couldn't find the way :( a first step, allowded me to trace all the files that contain it and even... (2 Replies)
Discussion started by: mehdi1973
2 Replies

2. UNIX for Dummies Questions & Answers

Command Character size limit in the "sh" and "bourne" shell

Hi!!.. I would like to know what is maximum character size for a command in the "sh" or "bourne" shell? Thanks in advance.. Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies

3. UNIX for Advanced & Expert Users

Command Character size limit in the "sh" and "bourne" shell

Hi!!.. I would like to know what is maximum character size for a command in the "sh" or "bourne" shell? Thanks in advance.. Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies

4. Red Hat

"ERROR : failed to mount nfs source" Red Hat Kickstart

Hi There, I have been googling for this error and try solution provided but still not avail to resolve Kickstart Issue. Any expert have encounter this problem? Thanks. Regards, Regmaster (4 Replies)
Discussion started by: regmaster
4 Replies

5. Shell Programming and Scripting

awk command to replace ";" with "|" and ""|" at diferent places in line of file

Hi, I have line in input file as below: 3G_CENTRAL;INDONESIA_(M)_TELKOMSEL;SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL My expected output for line in the file must be : "1-Radon1-cMOC_deg"|"LDIndex"|"3G_CENTRAL|INDONESIA_(M)_TELKOMSEL"|LAST|"SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL" Can someone... (7 Replies)
Discussion started by: shis100
7 Replies

6. UNIX for Dummies Questions & Answers

how to know if i use "Red Hat Enterprise Linux" or "Red Hat Desktop" ?

how to know if i use "Red Hat Enterprise Linux" or "Red Hat Desktop" ? (2 Replies)
Discussion started by: ahmedamer12
2 Replies

7. UNIX for Dummies Questions & Answers

Using "mailx" command to read "to" and "cc" email addreses from input file

How to use "mailx" command to do e-mail reading the input file containing email address, where column 1 has name and column 2 containing “To” e-mail address and column 3 contains “cc” e-mail address to include with same email. Sample input file, email.txt Below is an sample code where... (2 Replies)
Discussion started by: asjaiswal
2 Replies
SYMCRYPTRUN(1)							 GNU Privacy Guard						    SYMCRYPTRUN(1)

NAME
symcryptrun - Call a simple symmetric encryption tool SYNOPSIS
symcryptrun --class class --program program --keyfile keyfile [--decrypt|--encrypt] [inputfile] DESCRIPTION
Sometimes simple encryption tools are already in use for a long time and there might be a desire to integrate them into the GnuPG frame- work. The protocols and encryption methods might be non-standard or not even properly documented, so that a full-fledged encryption tool with an interface like gpg is not doable. symcryptrun provides a solution: It operates by calling the external encryption/decryption mod- ule and provides a passphrase for a key using the standard pinentry based mechanism through gpg-agent. Note, that symcryptrun is only available if GnuPG has been configured with '--enable-symcryptrun' at build time. For encryption, the plain text must be provided on STDIN or as the argument inputfile, and the ciphertext will be output to STDOUT. For decryption vice versa. CLASS describes the calling conventions of the external tool. Currently it must be given as 'confucius'. PROGRAM is the full filename of that external tool. For the class 'confucius' the option --keyfile is required; keyfile is the name of a file containing the secret key, which may be protected by a passphrase. For detailed calling conventions, see the source code. Note, that gpg-agent must be running before starting symcryptrun. The following additional options may be used: -v --verbose Output additional information while running. -q --quiet Try to be as quiet as possible. --homedir dir Set the name of the home directory to dir. If this option is not used, the home directory defaults to '~/.gnupg'. It is only recog- nized when given on the command line. It also overrides any home directory stated through the environment variable 'GNUPGHOME' or (on W32 systems) by means of the Registry entry HKCUSoftwareGNUGnuPG:HomeDir. --log-file file Append all logging output to file. Default is to write logging information to STDERR. The possible exit status codes of symcryptrun are: 0 Success. 1 Some error occured. 2 No valid passphrase was provided. 3 The operation was canceled by the user. SEE ALSO
gpg(1), gpgsm(1), gpg-agent(1), The full documentation for this tool is maintained as a Texinfo manual. If GnuPG and the info program are properly installed at your site, the command info gnupg should give you access to the complete manual including a menu structure and an index. GnuPG 2.0.15 2010-07-05 SYMCRYPTRUN(1)
All times are GMT -4. The time now is 05:23 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy