11-14-2005
encrypting file system using AES 256 bit
Experts,
I am trying to encrypt my filesystem using the AES 256 bit type of encryption. I am using FreeBSD 5.4 and need to encrypt one of the mounted points. Does anybody have any good idea of how to do it?
Is there any documentation about encrypting the disk partition as this method is more safer I guess. Please advice?
I heard lots of ways to generate passpharse. Does anybody have any good idea.
Thanks in advance
Regards,
Jim
8 More Discussions You Might Find Interesting
1. Programming
I'm writing both 8-bit and wide 16-bit data to the screen and an output file. I have no problems with writing out to the screen - for example:
cout<<8-bit data;
wcout<<16-bit data;
Similarly, I have used ofstream for 8-bit and wofstream for 16-bit, for example:
ofstream out;
wofstream wout;... (1 Reply)
Discussion started by: Breen
1 Replies
2. UNIX for Dummies Questions & Answers
heyfrenz i just need a proper explanation of why is unix a 32-bit operating system??....a proper answer with proper explanation.... (6 Replies)
Discussion started by: silverrock7
6 Replies
3. Linux
How to check the Linux operating System bit version i.e if the operating system is 32-bit verison or 64-bit verison?
There is a file which gives this information, i think it is in /usr/bin or /usr/sbin. I am not sure about this? This Might be a silly question, but it is important.
;) (7 Replies)
Discussion started by: sasiharshav
7 Replies
4. Homework & Coursework Questions
1. The problem statement, all variables and given/known data:
Hi all,
I've got a huuuuuuge problem with understanding this new concept of multi-paging. I really tried to research but i could not find anything significant. I've been trying to understand this for 4 days and i cannot. The question... (0 Replies)
Discussion started by: snowboarder
0 Replies
5. Red Hat
Hi,
I have a 64-bit RHEL 5.5. In order to make a particular product work I want to uninstall some rpms which is specific to 64 bit. Wondering if anyone has a way how to remove the 64-bit rpm without disturbing the i386 rpms.
What I find when I googled is all are removing forcefully, but... (2 Replies)
Discussion started by: dbashyam
2 Replies
6. Shell Programming and Scripting
Hello,
I am a newbie in Shell scripting. At the moment, I have a program written in C++ which gives an output file in text format. I would like to write a shell program which can take that output file and encrypt it and later if needed I want to decrypt it.
Could someone please help or... (3 Replies)
Discussion started by: Tanin
3 Replies
7. Cybersecurity
Toucan software uses 256bit AES encryption using ccrypt (https://en.wikipedia.org/wiki/Ccrypt)
i want to ask if its secure to use this ccrypt encryption for storing .TXT file with my passwords on cloud storage like Google Drive? (7 Replies)
Discussion started by: postcd
7 Replies
8. Programming
Various Node-Red crypto modules do not work with PHP, so to send an encrypted message from a PHP script (in this case from a Ubuntu server) to Node-RED we need our own code.
After a few hours of searching, testing various libs, more testing and debugging, I got this PHP to Node-RED code... (0 Replies)
Discussion started by: Neo
0 Replies
CRYPT(3) Library Functions Manual CRYPT(3)
NAME
crypt, setkey, encrypt - DES encryption
SYNOPSIS
char *crypt(key, salt)
char *key, *salt;
setkey(key)
char *key;
encrypt(block, edflag)
char *block;
DESCRIPTION
Crypt is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended (among other things)
to frustrate use of hardware implementations of the DES for key search.
The first argument to crypt is a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./]. The salt
string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeat-
edly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two characters
are the salt itself.
The other entries provide (rather primitive) access to the actual DES algorithm. The argument of setkey is a character array of length 64
containing only the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group
is ignored, leading to a 56-bit key which is set into the machine.
The argument to the encrypt entry is likewise a character array of length 64 containing 0's and 1's. The argument array is modified in
place to a similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by
setkey. If edflag is 0, the argument is encrypted; if non-zero, it is decrypted.
SEE ALSO
passwd(1), passwd(5), login(1), getpass(3)
BUGS
The return value points to static data whose content is overwritten by each call.
CRYPT(3)