Sponsored Content
Special Forums Cybersecurity File encryption tools with MAC address as an encryption key Post 302896918 by sergionicosta on Thursday 10th of April 2014 01:43:20 AM
Old 04-10-2014
I'm sorry, there is a missing information.
For symmetric key, it uses AES to generate the symmetric key.

Other than AES key, it has another security feature, which is the file can only be decrypted on the computer that has similar MAC address with the destination MAC address that was defined during encryption by the sender.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

2. AIX

file encryption in aix

Hi All, I have a AIX 5.3. does anybody know how to encrypt a text file? Thanks, Vishal (4 Replies)
Discussion started by: vishalpatel03
4 Replies

3. UNIX for Dummies Questions & Answers

VIM: Encryption key.

I'm having one doubt about the VIM ENCRYPTION key. I having a text file, I encrypted that file using :X vim -x filename Now, where the encrypted key is stored (path). Whether it stored in a separate file or the text file itself. If I open a the file it asked Encryption key. How it compare... (1 Reply)
Discussion started by: ungalnanban
1 Replies

4. UNIX for Dummies Questions & Answers

Remove VI encryption key from file

Hi There, I have set encryption key to my file using :X command. Now that I no more need encryption key to the file, I just want to delete/remove the encryption key. I have gone through many source but in vain. None of the source provided me with the solution that I am looking for. I... (2 Replies)
Discussion started by: grc
2 Replies

5. Red Hat

file encryption

Hello! I want to know about file encryption in redhat linux.... Please suggest me some gud websites from where i can get detailed information... Thanks in advance.... (3 Replies)
Discussion started by: aliyaa
3 Replies

6. Linux

It is possible to find out when a particular encryption key was imported in linux

Hi All, In linux server some encryption keys were imported using gpg command. I want to know when those keys was imported. Is there any way to get when the encryption keys were imported? Thanks in advance.. :rolleyes: (1 Reply)
Discussion started by: latika
1 Replies

7. Solaris

Need to disable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm

Hi All Is any one know how to diable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm in solaris 10. Regards (4 Replies)
Discussion started by: amity
4 Replies

8. UNIX for Advanced & Expert Users

Private and public key encryption

Hi, we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have? encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
Image::ExifTool::AES(3pm)				User Contributed Perl Documentation				 Image::ExifTool::AES(3pm)

NAME
Image::ExifTool::AES - AES encryption with cipher-block chaining SYNOPSIS
use Image::ExifTool::AES qw(Crypt); $err = Crypt($plaintext, $key, 1); # encryption $err = Crypt($ciphertext, $key); # decryption DESCRIPTION
This module contains an implementation of the AES encryption/decryption algorithms with cipher-block chaining (CBC) and RFC 2898 PKCS #5 padding. This is the AESV2 and AESV3 encryption mode used in PDF documents. EXPORTS
Exports nothing by default, but "Crypt" may be exported. METHODS
Crypt Implement AES encryption/decryption with cipher-block chaining. Inputs: 0) Scalar reference for data to encrypt/decrypt. 1) Encryption key string (must have length 16, 24 or 32). 2) [optional] Encrypt flag (false to decrypt). 3) [optional] Flag to avoid removing padding after decrypting, or to avoid adding 16 bytes of padding before encrypting when data length is already a multiple of 16 bytes. Returns: On success, the return value is undefined and the data is encrypted or decrypted as specified. Otherwise returns an error string and the data is left in an indeterminate state. Notes: The length of the encryption key dictates the AES mode, with lengths of 16, 24 and 32 bytes resulting in AES-128, AES-192 and AES-256. When encrypting, the input data may be any length and will be padded to an even 16-byte block size using the specified padding technique. If the encrypt flag has length 16, it is used as the initialization vector for the cipher-block chaining, otherwise a random IV is generated. Upon successful return the data will be encrypted, with the first 16 bytes of the data being the CBC IV. When decrypting, the input data begins with the 16-byte CBC initialization vector. BUGS
This code is blindingly slow. But in truth, slowing down processing is the main purpose of encryption, so this really can't be considered a bug. AUTHOR
Copyright 2003-2011, Phil Harvey (phil at owl.phy.queensu.ca) This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. REFERENCES
<http://www.hoozi.com/Articles/AESEncryption.htm> http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf <http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf> <http://www.faqs.org/rfcs/rfc3602.html> SEE ALSO
Image::ExifTool(3pm) perl v5.12.4 2011-03-04 Image::ExifTool::AES(3pm)
All times are GMT -4. The time now is 08:45 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy