5 More Discussions You Might Find Interesting
1. Cybersecurity
Toucan software uses 256bit AES encryption using ccrypt (https://en.wikipedia.org/wiki/Ccrypt)
i want to ask if its secure to use this ccrypt encryption for storing .TXT file with my passwords on cloud storage like Google Drive? (7 Replies)
Discussion started by: postcd
7 Replies
2. Programming
I am developing a JAVA application that must encrypt its data. On my development machine, I can use a 256 bit key with no problem. A test machine throws an exception complaining about an illegal key length. The test machine is using JRE 1.6u21. Does anyone know where I can get a version of the JRE... (1 Reply)
Discussion started by: ilikecows
1 Replies
3. What is on Your Mind?
Hey,
I was just reminded to something:
Years ago I have seen a cartoon, maybe dilbert-style?, with a couple of nerds talking. The title was "Computer-people probably aliens?" and the guys were saying all kinds of unix-commands with funny sounds, like gawk, grep, sed, awk and so on.
Does... (0 Replies)
Discussion started by: PatrickBaer
0 Replies
4. Programming
Hi,
Any body can please point me to source code for implementing AES encryption in CTR mode i.e RFC 3686 (AES-CTR).I did googling but no good results. (6 Replies)
Discussion started by: Raom
6 Replies
5. UNIX for Advanced & Expert Users
Experts,
I am trying to encrypt my filesystem using the AES 256 bit type of encryption. I am using FreeBSD 5.4 and need to encrypt one of the mounted points. Does anybody have any good idea of how to do it?
Is there any documentation about encrypting the disk partition as this method is more... (2 Replies)
Discussion started by: jimmynath
2 Replies
AESNI(4) BSD Kernel Interfaces Manual AESNI(4)
NAME
aesni -- driver for the AES accelerator on Intel CPUs
SYNOPSIS
To compile this driver into the kernel, place the following lines in your kernel configuration file:
device crypto
device aesni
Alternatively, to load the driver as a module at boot time, place the following line in loader.conf(5):
aesni_load="YES"
DESCRIPTION
Starting with some models of Core i5/i7, Intel processors implement a new set of instructions called AESNI. The set of six instructions
accelerates the calculation of the key schedule for key lengths of 128, 192, and 256 of the Advanced Encryption Standard (AES) symmetric
cipher, and provides a hardware implementation of the regular and the last encryption and decryption rounds.
The processor capability is reported as AESNI in the Features2 line at boot. The aesni driver does not attach on systems that lack the
required CPU capability.
The aesni driver registers itself to accelerate AES operations for crypto(4). Besides speed, the advantage of using the aesni driver is that
the AESNI operation is data-independent, thus eliminating some attack vectors based on measuring cache use and timings typically present in
table-driven implementations.
SEE ALSO
crypt(3), crypto(4), intro(4), ipsec(4), padlock(4), random(4), crypto(9)
HISTORY
The aesni driver first appeared in FreeBSD 9.0.
AUTHORS
The aesni driver was written by Konstantin Belousov <kib@FreeBSD.org>. The key schedule calculation code was adopted from the sample pro-
vided by Intel and used in the analogous OpenBSD driver.
BSD
September 6, 2010 BSD