Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

makekey(1) [hpux man page]

makekey(1)						      General Commands Manual							makekey(1)

NAME
makekey - generate encryption key SYNOPSIS
DESCRIPTION
improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second). The first eight input bytes (the input key) can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of digits, and uppercase and lowercase letters. The salt characters are repeated as the first two characters of the output. The remaining 11 output characters are chosen from the same set as the salt and constitute the output key. The transformation performed is essentially the following: the salt is used to select one of 4,096 cryptographic machines all based on the National Bureau of Standards DES algorithm, but broken in 4,096 different ways. Using the input key as key, a constant string is fed into the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 output key bits in the result. is intended for programs that perform encryption (e.g., ed(1) and crypt(1)). Usually, its input and output will be pipes. SEE ALSO
crypt(1), ed(1), passwd(4). makekey(1)

Check Out this Related Man Page

MAKEKEY(8)						      System Manager's Manual							MAKEKEY(8)

NAME
makekey - generate encryption key SYNOPSIS
/usr/lib/makekey DESCRIPTION
Makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input, and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e. to require a substantial fraction of a second). The first eight input bytes (the input key) can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of digits, upper- and lower-case letters, and `.' and `/'. The salt characters are repeated as the first two characters of the output. The remaining 11 output characters are chosen from the same set as the salt and constitute the output key. The transformation performed is essentially the following: the salt is used to select one of 4096 cryptographic machines all based on the National Bureau of Standards DES algorithm, but modified in 4096 different ways. Using the input key as key, a constant string is fed into the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 useful key bits in the result. Makekey is intended for programs that perform encryption (e.g. ed and crypt(1)). Usually its input and output will be pipes. SEE ALSO
crypt(1), ed(1) MAKEKEY(8)
Man Page

3 More Discussions You Might Find Interesting

1. Programming

A question about output.

I am learning output the data to a file using "ofstream". I need to read data from a file and output the result to the other file in 2 different ways. To do that I have to provoke two functions, and they have to output the result to the same text file. My problem is: they are correct on the screen... (2 Replies)
Discussion started by: HOUSCOUS
2 Replies

2. UNIX for Dummies Questions & Answers

Formatting the o/p of ls command to a file

HI, I require only the file name and the user information from the ls output into a file. The layout of the file is already defined as: User id is in the first 7 bytes FName is in the next 50 bytes Assuming that user id is less than or = 7 bytes and File name is less than or = 50 bytes... (5 Replies)
Discussion started by: Meghna
5 Replies

3. UNIX for Dummies Questions & Answers

Remove VI encryption key from file

Hi There, I have set encryption key to my file using :X command. Now that I no more need encryption key to the file, I just want to delete/remove the encryption key. I have gone through many source but in vain. None of the source provided me with the solution that I am looking for. I... (2 Replies)
Discussion started by: grc
2 Replies