02-01-2011
Encryption in AIX
Can I encrypt PDF files in AIX 5.3?
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
NEED expertise help for this topic!!!
Question 1: Is encryption possible for the shell scriping programing? shadow the scriping file, do think is impossible...
Question2: built a simple program with the simplicity function that allow user change settings by enter corret name and... (3 Replies)
Discussion started by: trynew
3 Replies
2. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
3. UNIX for Advanced & Expert Users
I use SCO OpenServer 5 and need to add encryption capability. Is there a standard SCO package, or should I go custom, or what? (2 Replies)
Discussion started by: coreysan
2 Replies
4. AIX
Hi
All,
I have a AIX 5.3. does anybody know how to encrypt a text file?
Thanks,
Vishal (4 Replies)
Discussion started by: vishalpatel03
4 Replies
5. AIX
Hi
Are there any tools out there that can encrypt files on a GPFS file system which are being accessed by multiple AIX 5.3 nodes?
Situation, I need various application servers to read/write files that are on a GPFS share. Therefore the encryption mechanisum need to be transparent to the... (1 Reply)
Discussion started by: maximum
1 Replies
6. Shell Programming and Scripting
Hi, I have a Java app that looks for some parameters in a .properties file such as username and password. However I don't want to leave the password in a text file and I can't modify the app...
Does anyone have some idea about how to encrypt/hide/etc the password so it's not freely accessible... (1 Reply)
Discussion started by: Tr0cken
1 Replies
7. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
8. Shell Programming and Scripting
Using awk or sed command how can i encrypt the characters for a particular column.For every character it should replace the third charter of alphabets.Example replace "A" with "C" and "B" with "D"..like this it should replace for all characters in particular column.
Using below command i am able... (3 Replies)
Discussion started by: katakamvivek
3 Replies
9. UNIX for Beginners Questions & Answers
Hi, we have a brand new Centos 6.8 build, and after some discussion it seems that there is some interest in securing the entire system using whole disk encryption.
What is/are the best option/s, and is this something that can be done after Centos is installed (like for example PGP WDE in Windows... (2 Replies)
Discussion started by: xdawg
2 Replies
crypt(3) Library Functions Manual crypt(3)
NAME
crypt, crypt16, setkey, encrypt - DES encryption
SYNOPSIS
#include <unistd.h>
#include <stdlib.h>
char *crypt(
const char *key,
const char *salt);
char *crypt16(
const char *key,
const char *salt);
void setkey(
const char *key);
DESCRIPTION
The subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate
use of hardware implementations of the DES for key search.
The first argument to is normally a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./]. The salt
string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeat-
edly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two characters
are the salt itself.
The subroutine is identical to the function except that it will accept a password up to sixteen characters in length. It generates a longer
encrypted password for use with enhanced security features.
The other entries provide primitive access to the actual DES algorithm. The argument of is a character array of length 64 containing only
the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group is ignored, lead-
ing to a 56-bit key which is set into the machine.
The argument to the entry is likewise a character array of length 64 containing 0s and 1s. The argument array is modified in place to a
similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by If edflag is 0,
the argument is encrypted; if non-zero, it is decrypted.
RESTRICTIONS
The return values from and point to static data areas whose content is overwritten by each call.
ENVIRONMENT
Default Environment
In the default environment on systems that do not have the optional encryption software installed the function expects exactly one argu-
ment, the data to be encrypted. The edflag argument is not supplied and there is no way to decrypt data. If the optional encryption soft-
ware is installed the function behaves as it does in the POSIX environment. The syntax for the default environment follows:
void encrypt(block)
char *block;
POSIX Environment
In the POSIX environment the encrypt function always expects two arguments. The function will set errno to ENOSYS and return if edflag is
non-zero and the optional encryption software is not present. The syntax for the POSIX environment follows:
void encrypt(block, edflag)
char *block;
int edflag;
In all cases the function will set errno to ENOSYS and return if the optional encryption software is not present.
RELATED INFORMATION
login(1), passwd(1), yppasswd(1), getpass(3), passwd(4), prpasswd(4) delim off
crypt(3)