Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Identify a file for encryption or decryption Post 302370839 by Neo on Thursday 12th of November 2009 02:36:44 PM
Old 11-12-2009
There are so many ways to encrypt a file.

For this reason, it is not really feasible to have a simple command to determine if the file is encrypted.

For example, how about an encryption scheme where you simply shift each letter of the alphabet to the right by 8 characters? Or how about if the encryption scheme is to substitute each letter based on a one time pad?

So, you need to be very specific when discussing "encrypted files".
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File Encryption and Decryption in UNIX.

Hello guys ! I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course. Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan. But when... (3 Replies)
Discussion started by: abidmalik
3 Replies

2. Programming

Password encryption/decryption in flat-text files

Dear all, If anyone has some ideas for me how to tackle the following situation: Imagine a type of client-server application. The client application is started by a human operator with all the necessary LDAP/Kerberos in place. The server application is started automatically as a daemon process.... (2 Replies)
Discussion started by: domivv
2 Replies

3. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

4. Solaris

PGP encryption/decryption solaris 9

Hi Someone is going to send me a file that they have encrypted by PGP encryption on windows pc to my solaris 9 server. They will give me the pgp key to decrypt the file. How can I do this on solaris 9 Is there a tool installed by default to decrypt or do I need to install something to... (0 Replies)
Discussion started by: frustrated1
0 Replies

5. Solaris

encryption & decryption functions in sun solaries

hi, is there any library functions available in sun solaries for encryption and decryption functions. regards suresh (1 Reply)
Discussion started by: suresh_rtp
1 Replies

6. Shell Programming and Scripting

String encryption and decryption

Hello All, There are so many questions on this and I didn't find any concluded answer. I want to encrypt a string in the script, actually this is a password. I tried using openssl (I am a newbie to openssl), but it is generating a long one which we can't remember. I want to encrypt the... (5 Replies)
Discussion started by: karumudi7
5 Replies

7. Ubuntu

help regarding encryption and decryption of files on linux

we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in this is to be made by chging source code of linux ........... can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies

8. Shell Programming and Scripting

auto encryption and decryption of files during log in and log off

we r to develope a project which involves automatic encryption of all the text files user was working upon during logg off and to decrypt them during log on this is to be done by writing a shell script can anyone help (2 Replies)
Discussion started by: vyom
2 Replies

9. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

10. Shell Programming and Scripting

Gpg (GnuPG) encryption and decryption

Hi Friends, There are some 7 years script in out linux server. I am trying to understand them since Linux Server changed(A). Below line in one of the encrypting script. Here scenario is encrypting bank files in our (A) server and doing Secure Copy to Server (B). GPG -v --batch --yes --armor... (1 Reply)
Discussion started by: johnsnow
1 Replies
crypt(3)						     Library Functions Manual							  crypt(3)

NAME
crypt, crypt16, setkey, encrypt - DES encryption SYNOPSIS
#include <unistd.h> #include <stdlib.h> char *crypt( const char *key, const char *salt); char *crypt16( const char *key, const char *salt); void setkey( const char *key); DESCRIPTION
The subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate use of hardware implementations of the DES for key search. The first argument to is normally a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./]. The salt string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeat- edly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two characters are the salt itself. The subroutine is identical to the function except that it will accept a password up to sixteen characters in length. It generates a longer encrypted password for use with enhanced security features. The other entries provide primitive access to the actual DES algorithm. The argument of is a character array of length 64 containing only the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group is ignored, lead- ing to a 56-bit key which is set into the machine. The argument to the entry is likewise a character array of length 64 containing 0s and 1s. The argument array is modified in place to a similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by If edflag is 0, the argument is encrypted; if non-zero, it is decrypted. RESTRICTIONS
The return values from and point to static data areas whose content is overwritten by each call. ENVIRONMENT
Default Environment In the default environment on systems that do not have the optional encryption software installed the function expects exactly one argu- ment, the data to be encrypted. The edflag argument is not supplied and there is no way to decrypt data. If the optional encryption soft- ware is installed the function behaves as it does in the POSIX environment. The syntax for the default environment follows: void encrypt(block) char *block; POSIX Environment In the POSIX environment the encrypt function always expects two arguments. The function will set errno to ENOSYS and return if edflag is non-zero and the optional encryption software is not present. The syntax for the POSIX environment follows: void encrypt(block, edflag) char *block; int edflag; In all cases the function will set errno to ENOSYS and return if the optional encryption software is not present. RELATED INFORMATION
login(1), passwd(1), yppasswd(1), getpass(3), passwd(4), prpasswd(4) delim off crypt(3)
All times are GMT -4. The time now is 04:28 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy