10-28-2012
You can break the message in smaller blocks and encrypt those. That's typically what happens with block cyphers.
If you want to use an asymmetric key pair like RSA to encrypt a whole message, then, yes, the message must be shorter than the modulus.
9 More Discussions You Might Find Interesting
1. Cybersecurity
This "quiz" was pretty easy (at least for me) and the prize is a trip to RSA.
http://www.messagelabs-quiz.com/Quiz/Index.asp
By the way, did anyone go to this last year? (0 Replies)
Discussion started by: defender77
0 Replies
2. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
3. Shell Programming and Scripting
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
4. UNIX for Advanced & Expert Users
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
5. UNIX for Advanced & Expert Users
Guys
How do i add RSA key for a host ?
I was able to connect to a host some time back but now its not connectable ,via SSH.
Message i get is :
abhi@myHost:~/.ssh> ssh eatcid@yourHost
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION... (3 Replies)
Discussion started by: ak835
3 Replies
6. UNIX for Dummies Questions & Answers
How to generate RSA 1024 public key??
Pls help (3 Replies)
Discussion started by: kdtrica
3 Replies
7. UNIX for Dummies Questions & Answers
On the website of Putty
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
http://www.chiark.greenend.org.uk/~sgtatham/putty/keys.html
It provides the RSA signatures and public keys of binary files.
It says:
We create PGP signatures for all the PuTTY files distributed... (6 Replies)
Discussion started by: vistastar
6 Replies
8. Red Hat
Hi All,
I have a scenario where from machine1 I need to establish sftp/ssh to machine2.
Internet is full of examples of this how to generate they key-pair etc... but all examples assume that the account is the same on machine1 and machine2.
I would like to do the following:
1) user1 on... (3 Replies)
Discussion started by: snailrider
3 Replies
9. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
LEARN ABOUT DEBIAN
image::exiftool::aes
Image::ExifTool::AES(3pm) User Contributed Perl Documentation Image::ExifTool::AES(3pm)
NAME
Image::ExifTool::AES - AES encryption with cipher-block chaining
SYNOPSIS
use Image::ExifTool::AES qw(Crypt);
$err = Crypt($plaintext, $key, 1); # encryption
$err = Crypt($ciphertext, $key); # decryption
DESCRIPTION
This module contains an implementation of the AES encryption/decryption algorithms with cipher-block chaining (CBC) and RFC 2898 PKCS #5
padding. This is the AESV2 and AESV3 encryption mode used in PDF documents.
EXPORTS
Exports nothing by default, but "Crypt" may be exported.
METHODS
Crypt
Implement AES encryption/decryption with cipher-block chaining.
Inputs:
0) Scalar reference for data to encrypt/decrypt.
1) Encryption key string (must have length 16, 24 or 32).
2) [optional] Encrypt flag (false to decrypt).
3) [optional] Flag to avoid removing padding after decrypting, or to avoid adding 16 bytes of padding before encrypting when data
length is already a multiple of 16 bytes.
Returns:
On success, the return value is undefined and the data is encrypted or decrypted as specified. Otherwise returns an error string and
the data is left in an indeterminate state.
Notes:
The length of the encryption key dictates the AES mode, with lengths of 16, 24 and 32 bytes resulting in AES-128, AES-192 and AES-256.
When encrypting, the input data may be any length and will be padded to an even 16-byte block size using the specified padding
technique. If the encrypt flag has length 16, it is used as the initialization vector for the cipher-block chaining, otherwise a
random IV is generated. Upon successful return the data will be encrypted, with the first 16 bytes of the data being the CBC IV.
When decrypting, the input data begins with the 16-byte CBC initialization vector.
BUGS
This code is blindingly slow. But in truth, slowing down processing is the main purpose of encryption, so this really can't be considered
a bug.
AUTHOR
Copyright 2003-2011, Phil Harvey (phil at owl.phy.queensu.ca)
This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
REFERENCES
<http://www.hoozi.com/Articles/AESEncryption.htm>
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf <http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf>
<http://www.faqs.org/rfcs/rfc3602.html>
SEE ALSO
Image::ExifTool(3pm)
perl v5.12.4 2011-03-04 Image::ExifTool::AES(3pm)