Sponsored Content
Special Forums Cybersecurity Is ccrypt AES 256 bit crypto secure enough? Post 302887067 by Perderabo on Wednesday 5th of February 2014 12:43:27 PM
Old 02-05-2014
I have never heard of ccrypt and your link does not convince me that AES-256 is in use. I mostly use gpg for AES-256 bit encryption. Like this:

Code:
gpg -c --cipher-algo aes256 secret.txt

and to decrypt the file:

Code:
gpg secret.txt.gpg

Your link talks about using Rijndael, not AES. Read the AES page on wikipedia. Only 3 members of the Rijndael family are used in AES and all of them have a block size 128 bits. Your link says ccrypt is using a blocksize of 256 bits. I wonder if you have block size and key size confused? ccrypt may be good enough for your purposes, but based on your llink I will stay with gpg.
This User Gave Thanks to Perderabo For This Post:
 

5 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

encrypting file system using AES 256 bit

Experts, I am trying to encrypt my filesystem using the AES 256 bit type of encryption. I am using FreeBSD 5.4 and need to encrypt one of the mounted points. Does anybody have any good idea of how to do it? Is there any documentation about encrypting the disk partition as this method is more... (2 Replies)
Discussion started by: jimmynath
2 Replies

2. Programming

AES encryption

Hi, Any body can please point me to source code for implementing AES encryption in CTR mode i.e RFC 3686 (AES-CTR).I did googling but no good results. (6 Replies)
Discussion started by: Raom
6 Replies

3. Programming

JAVA AES keylength exception

I am developing a JAVA application that must encrypt its data. On my development machine, I can use a 256 bit key with no problem. A test machine throws an exception complaining about an illegal key length. The test machine is using JRE 1.6u21. Does anyone know where I can get a version of the JRE... (1 Reply)
Discussion started by: ilikecows
1 Replies

4. UNIX for Dummies Questions & Answers

Using sed with special characters produced from crypto

Hey there, I'm facing some weird issues with sed when trying to do substitution in a text file with the content of some environment variables. Those variables are used to store crypted (3DES) info with much special characters and that's where the problem starts. I've already tried to use both... (7 Replies)
Discussion started by: Jormun
7 Replies

5. Programming

Publish and Subscribe to AES-256 Encrypted MQTT Messages to Node-RED from PHP Scripts

Various Node-Red crypto modules do not work with PHP, so to send an encrypted message from a PHP script (in this case from a Ubuntu server) to Node-RED we need our own code. After a few hours of searching, testing various libs, more testing and debugging, I got this PHP to Node-RED code... (0 Replies)
Discussion started by: Neo
0 Replies
Rijndael(3pm)						User Contributed Perl Documentation					     Rijndael(3pm)

NAME
Crypt::Rijndael - Crypt::CBC compliant Rijndael encryption module SYNOPSIS
use Crypt::Rijndael; # keysize() is 32, but 24 and 16 are also possible # blocksize() is 16 $cipher = Crypt::Rijndael->new( "a" x 32, Crypt::Rijndael::MODE_CBC() ); $cipher->set_iv($iv); $crypted = $cipher->encrypt($plaintext); # - OR - $plaintext = $cipher->decrypt($crypted); DESCRIPTION
This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to "Crypt::CBC". blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new "Crypt::Rijndael" cipher object with the given key (which must be 128, 192 or 256 bits long). The additional $mode argument is the encryption mode, either "MODE_ECB" (electronic codebook mode, the default), "MODE_CBC" (cipher block chaining, the same that "Crypt::CBC" does), "MODE_CFB" (128-bit cipher feedback), "MODE_OFB" (128-bit output feedback), or "MODE_CTR" (counter mode). ECB mode is very insecure (read a book on cryptography if you dont know why!), so you should probably use CBC mode. $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. $cipher->encrypt($data) Encrypt data. The size of $data must be a multiple of "blocksize" (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. $cipher->decrypt($data) Decrypts $data. Encryption modes Use these constants to select the cipher type: MODE_CBC - Cipher Block Chaining MODE_CFB - Cipher feedback MODE_CTR - Counter mode MODE_ECB - Electronic cookbook mode MODE_OFB - Output feedback MODE_PCBC - ignore this one for now :) SEE ALSO
Crypt::CBC, http://www.csrc.nist.gov/encryption/aes/ BUGS
Should EXPORT or EXPORT_OK the MODE constants. AUTHOR
Currently maintained by brian d foy, "<bdfoy@cpan.org>". Original code by Rafael R. Sevilla. The Rijndael Algorithm was developed by Vincent Rijmen and Joan Daemen, and has been selected as the US Government's Advanced Encryption Standard. SOURCE
This code is in Github: git://github.com/briandfoy/crypt-rijndael.git LICENSE
This software is licensed under the Lesser GNU Public License. See the included COPYING file for details. perl v5.14.2 2009-12-10 Rijndael(3pm)
All times are GMT -4. The time now is 05:47 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy