04-10-2014
I'm sorry, there is a missing information.
For symmetric key, it uses AES to generate the symmetric key.
Other than AES key, it has another security feature, which is the file can only be decrypted on the computer that has similar MAC address with the destination MAC address that was defined during encryption by the sender.
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
2. AIX
Hi
All,
I have a AIX 5.3. does anybody know how to encrypt a text file?
Thanks,
Vishal (4 Replies)
Discussion started by: vishalpatel03
4 Replies
3. UNIX for Dummies Questions & Answers
I'm having one doubt about the VIM ENCRYPTION key. I having a text file, I encrypted that file using :X vim -x filename Now, where the encrypted key is stored (path). Whether it stored in a separate file or the text file itself. If I open a the file it asked Encryption key. How it compare... (1 Reply)
Discussion started by: ungalnanban
1 Replies
4. UNIX for Dummies Questions & Answers
Hi There,
I have set encryption key to my file using :X command.
Now that I no more need encryption key to the file, I just want to delete/remove the encryption key. I have gone through many source but in vain. None of the source provided me with the solution that I am looking for.
I... (2 Replies)
Discussion started by: grc
2 Replies
5. Red Hat
Hello!
I want to know about file encryption in redhat linux.... Please suggest me some gud websites from where i can get detailed information...
Thanks in advance.... (3 Replies)
Discussion started by: aliyaa
3 Replies
6. Linux
Hi All,
In linux server some encryption keys were imported using gpg command.
I want to know when those keys was imported.
Is there any way to get when the encryption keys were imported?
Thanks in advance..
:rolleyes: (1 Reply)
Discussion started by: latika
1 Replies
7. Solaris
Hi All
Is any one know how to diable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm in solaris 10.
Regards (4 Replies)
Discussion started by: amity
4 Replies
8. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
LEARN ABOUT DEBIAN
image::exiftool::aes
Image::ExifTool::AES(3pm) User Contributed Perl Documentation Image::ExifTool::AES(3pm)
NAME
Image::ExifTool::AES - AES encryption with cipher-block chaining
SYNOPSIS
use Image::ExifTool::AES qw(Crypt);
$err = Crypt($plaintext, $key, 1); # encryption
$err = Crypt($ciphertext, $key); # decryption
DESCRIPTION
This module contains an implementation of the AES encryption/decryption algorithms with cipher-block chaining (CBC) and RFC 2898 PKCS #5
padding. This is the AESV2 and AESV3 encryption mode used in PDF documents.
EXPORTS
Exports nothing by default, but "Crypt" may be exported.
METHODS
Crypt
Implement AES encryption/decryption with cipher-block chaining.
Inputs:
0) Scalar reference for data to encrypt/decrypt.
1) Encryption key string (must have length 16, 24 or 32).
2) [optional] Encrypt flag (false to decrypt).
3) [optional] Flag to avoid removing padding after decrypting, or to avoid adding 16 bytes of padding before encrypting when data
length is already a multiple of 16 bytes.
Returns:
On success, the return value is undefined and the data is encrypted or decrypted as specified. Otherwise returns an error string and
the data is left in an indeterminate state.
Notes:
The length of the encryption key dictates the AES mode, with lengths of 16, 24 and 32 bytes resulting in AES-128, AES-192 and AES-256.
When encrypting, the input data may be any length and will be padded to an even 16-byte block size using the specified padding
technique. If the encrypt flag has length 16, it is used as the initialization vector for the cipher-block chaining, otherwise a
random IV is generated. Upon successful return the data will be encrypted, with the first 16 bytes of the data being the CBC IV.
When decrypting, the input data begins with the 16-byte CBC initialization vector.
BUGS
This code is blindingly slow. But in truth, slowing down processing is the main purpose of encryption, so this really can't be considered
a bug.
AUTHOR
Copyright 2003-2011, Phil Harvey (phil at owl.phy.queensu.ca)
This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
REFERENCES
<http://www.hoozi.com/Articles/AESEncryption.htm>
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf <http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf>
<http://www.faqs.org/rfcs/rfc3602.html>
SEE ALSO
Image::ExifTool(3pm)
perl v5.12.4 2011-03-04 Image::ExifTool::AES(3pm)