Sponsored Content
Operating Systems Linux RSA decrypt with public key ? Post 302306168 by pludi on Saturday 11th of April 2009 10:54:37 AM
Old 04-11-2009
Public key cryptography always works the same way: Encryption is done with the public key, decryption done with the private key. It is not possible to decrypt anything with the public key (otherwise the whole system would crash down). The only time it's done the other way is for message authentication, where only a digest of a message is encrypted and can be verified (not decrypted) using the public key.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Register RSA Key fingerprint with JVM 1.4.2

Hi, We wish to register RSA key fingerprint with JVM 1.4.2 under UNIX environment. Any inputs how to go for it? The output we are getting as "The authenticity of host 'sxfer01.bluecrossmn.com (159.136.224.30)' can't be established. RSA key fingerprint is... (0 Replies)
Discussion started by: asawari
0 Replies

2. Shell Programming and Scripting

RSA key fingerprint needs to be avoided.

Hi All, I need to scp a folder from one host to another in a script. When I run a command , it asks me to authenticate for the RSA key fingerprint for the first time. # scp -r temp1 root@iqcarrot:/root/ The authenticity of host 'iqmango.apac.avaya.com (148.147.172.112)' can't be... (2 Replies)
Discussion started by: nua7
2 Replies

3. Shell Programming and Scripting

automating RSA key pair generation

I want to automate the process of generating RSA keys. I want to remotley login to a linux machine from a windows maching without having to enter a password. For this I need to generate the RSA key pair. but I want to do this procedure on alot of linux machines. For which I was looking to automate... (2 Replies)
Discussion started by: lassimanji
2 Replies

4. UNIX for Dummies Questions & Answers

How to change the RSA key fingerprint?

Hi there, I have a Linux Debian machine with the following fingerprint : e1:95:11:46:ff:d1:e3:4a:a3:34:1a:25:b4:d8:f1:cb. I'd like to set this fingerprint to : cd:19:bd:f6:8e:00:7a:69:14:52:a1:73:cb:15:a5:ca. I have very specific reasons to do that. So please only answer if you know how... (5 Replies)
Discussion started by: chebarbudo
5 Replies

5. Shell Programming and Scripting

Encrypt/Decrypt string with rsa keys

Hello, I wanted to know if there was a way to encrypt a string, not a file using openssl and then decrypt it? I cant seem to get it to work. This is what I have been trying but I'm not having much luck. encTxt=`echo "$1" | openssl dgst -sha1 -binary | openssl rsautl -sign -inkey... (1 Reply)
Discussion started by: tjones1105
1 Replies

6. UNIX for Advanced & Expert Users

RSA host key addition

Guys How do i add RSA key for a host ? I was able to connect to a host some time back but now its not connectable ,via SSH. Message i get is : abhi@myHost:~/.ssh> ssh eatcid@yourHost @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION... (3 Replies)
Discussion started by: ak835
3 Replies

7. Solaris

Solaris 8 ssh public key authentication issue - Server refused our key

Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks. ... (1 Reply)
Discussion started by: aixlover
1 Replies

8. Cybersecurity

Help troubleshooting RSA Key login attempts

I'm stumped on an issue I'm having with RSA key based SSH logons. I have 30 servers in a database cluster. They are all Red Hat Enterprise Linux Server release 6.4. I want to be able to run a command on all of them from any one of them using SSH. I generated private and public keys on... (1 Reply)
Discussion started by: derndingle
1 Replies

9. Red Hat

How to use rsa key for a different user?

Hi All, I have a scenario where from machine1 I need to establish sftp/ssh to machine2. Internet is full of examples of this how to generate they key-pair etc... but all examples assume that the account is the same on machine1 and machine2. I would like to do the following: 1) user1 on... (3 Replies)
Discussion started by: snailrider
3 Replies

10. Shell Programming and Scripting

Rsa public private key matching

Hi All, I have a requirement where i need to check if an rsa public key corresponds to a private key and hence return success or failure. Currently i am using the command diff <( ssh-keygen -y -e -f "$PRIVKEY" ) <( ssh-keygen -y -e -f "$PUBLICKEY" ) and its solving my purpose. This is in... (1 Reply)
Discussion started by: mritusmoi
1 Replies
AMCRYPT-OSSL-ASYM(8)					  System Administration Commands				      AMCRYPT-OSSL-ASYM(8)

NAME
amcrypt-ossl-asym - crypt program for Amanda asymmetric data encryption using OpenSSL SYNOPSIS
amcrypt-ossl-asym [-d] DESCRIPTION
amcrypt-ossl-asym uses OpenSSL to encrypt and decrypt data. OpenSSL is available from www.openssl.org. OpenSSL offers a wide variety of cipher choices ( amcrypt-ossl-asym defaults to 256-bit AES) and can use hardware cryptographic accelerators on several platforms. amcrypt-ossl-asym will search for the OpenSSL program in the following directories: /bin:/usr/bin:/usr/local/bin:/usr/ssl/bin:/usr/local/ssl/bin. GENERATING PUBLIC AND PRIVATE KEYS
RSA keys can be generated with the standard OpenSSL commands, e.g.: $ cd /var/lib/amanda $ openssl genrsa -aes128 -out backup-privkey.pem 1024 Generating RSA private key, 1024 bit long modulus [...] Enter pass phrase for backup-privkey.pem: ENTER YOUR PASS PHRASE Verifying - Enter pass phrase for backup-key.pem: ENTER YOUR PASS PHRASE $ openssl rsa -in backup-privkey.pem -pubout -out backup-pubkey.pem Enter pass phrase for backup-privkey.pem: ENTER YOUR PASS PHRASE Writing RSA key To generate a private key without a passphrase, omit the -aes128 option. See openssl_genrsa(1) for more key generation options. Note that it is always possible to generate the public key from the private key. KEY AND PASSPHRASE MANAGEMENT
amcrypt-ossl-asym uses the public key to encrypt data. The security of the data does not depend on the confidentiality of the public key. The private key is used to decrypt data, and must be protected. Encrypted backup data cannot be recovered without the private key. The private key may optionally be encrypted with a passphrase. While the public key must be online at all times to perorm backups, the private key and optional passphrase are only needed to restore data. It is recommended that the latter be stored offline all other times. For example, you could keep the private key on removable media, and copy it into place for a restore; or you could keep the private key online, encrypted with a passphrase that is present only for a restore. OpenSSL's key derivation routines use a salt to guard against dictionary attacks on the pass phrase; still it is important to pick a pass phrase that is hard to guess. The Diceware method (see www.diceware.com) can be used to create passphrases that are difficult to guess and easy to remember. FILES
/var/lib/amanda/backup-privkey.pem File containing the RSA private key. It should not be readable by any user other than the Amanda user. /var/lib/amanda/backup-pubkey.pem File containing the RSA public key. /var/lib/amanda/.am_passphrase File containing the passphrase. It should not be readable by any user other than the Amanda user. SEE ALSO
amanda(8), amanda.conf(5), openssl(1), amcrypt-ossl(8) The Amanda Wiki: : http://wiki.zmanda.com/ AUTHOR
Kevin Till <kevin.till@zmanda.com> Zmanda, Inc. (http://www.zmanda.com) NOTES
1. www.openssl.org http://www.openssl.org/ 2. www.diceware.com http://www.diceware.com/ Amanda 3.3.1 02/21/2012 AMCRYPT-OSSL-ASYM(8)
All times are GMT -4. The time now is 08:13 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy