Visit Our UNIX and Linux User Community


File Encryption and Decryption in UNIX.


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers File Encryption and Decryption in UNIX.
# 1  
Old 08-27-2002
File Encryption and Decryption in UNIX.

Hello guys !

I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course.

Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan.

But when i decrypt the same file ("crypt <first> second") and gave the same key and try to see contents of file "second", it is still encrypted why ?

after decryption, you should not be able to see the contents of file in plain text ?

Please help me in this regad.

Thanks and Regards
Abid Malik
# 2  
Old 08-27-2002
To decrypt, the input must the encrypted file. You are just running the encyption step twice.

crypt < plain > encrypted ## encrypt file
crypt < encrypted ## view the file
# 3  
Old 08-27-2002
look at your syntax...

Oops! I guess Perderabo was editing when I was!!

Anyway, you have a few issues here.


First, you can't use cat. If you want to view an encrypted file, you must use the [B]vi -x <filename> command. Usually the crypted file ends in *.x]/B]

Next, when you decrypt the file, you are extracting the file from the encrypted file. I believe that you must give a filename for it to extract to.

It appears that you didn't reverse the order of first second to second first when you were decrypting.

to encrypt:
crypt <file1 >file2.x

to decrypt:
crypt <file2.x >file1

Of course, you will have to cleanup any unencrypted files that you create or clear the screen to erase what went to std out.


This should fix your problem.
# 4  
Old 08-27-2002
Hammer & Screwdriver

Hello there !

First of let me Thank "Kelam_magnus" and "Perderabo" for solving my problem and helping to understand that encryption issue.

I got it very well. You both are right. i tried both ways and it did work fine.

this is what i did.

----------------- for encryption of "first" to "second"------------

$> crypt <first> second
$> enter Key: test
$>
----------------- for decryption----------------------------
$> crypt < second
$> enter Key: test

and it shows me the content of file.

then i tried in vi.. Kelam_magnus is right about -x option of vi. it uses for cryption and decryption.

vi -x second
enter key: test

and here is contents of file.

one thing i notice that the encryption file donot have to be end with .x or anything. i am not positive but it worked fine without it.

Thanks again and see you in my next question.

Abid Malik
 

Previous Thread | Next Thread
Test Your Knowledge in Computers #807
Difficulty: Medium
A key advantage of a MOSFET is that it requires zero input current to control the load current.
True or False?

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Gpg (GnuPG) encryption and decryption

Hi Friends, There are some 7 years script in out linux server. I am trying to understand them since Linux Server changed(A). Below line in one of the encrypting script. Here scenario is encrypting bank files in our (A) server and doing Secure Copy to Server (B). GPG -v --batch --yes --armor... (1 Reply)
Discussion started by: johnsnow
1 Replies

2. Shell Programming and Scripting

auto encryption and decryption of files during log in and log off

we r to develope a project which involves automatic encryption of all the text files user was working upon during logg off and to decrypt them during log on this is to be done by writing a shell script can anyone help (2 Replies)
Discussion started by: vyom
2 Replies

3. Ubuntu

help regarding encryption and decryption of files on linux

we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in this is to be made by chging source code of linux ........... can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies

4. Shell Programming and Scripting

String encryption and decryption

Hello All, There are so many questions on this and I didn't find any concluded answer. I want to encrypt a string in the script, actually this is a password. I tried using openssl (I am a newbie to openssl), but it is generating a long one which we can't remember. I want to encrypt the... (5 Replies)
Discussion started by: karumudi7
5 Replies

5. UNIX Desktop Questions & Answers

decryption of .cpt file in unix

can some one help me how to decrypt a .txt.cpt file in unix i Double post (0 Replies)
Discussion started by: lily
0 Replies

6. UNIX for Dummies Questions & Answers

Identify a file for encryption or decryption

Dear Members, Can we find if a particular file is encrypted or decrypted. I need a command by which i should be able to identify if a file is encrypted or decrypted. How can we do this? (1 Reply)
Discussion started by: sandeep_1105
1 Replies

7. Solaris

encryption & decryption functions in sun solaries

hi, is there any library functions available in sun solaries for encryption and decryption functions. regards suresh (1 Reply)
Discussion started by: suresh_rtp
1 Replies

8. AIX

unix file encryption

Is there a way to encrypt a flat file or a database file so it can be ftp or sftp to a remote windows system? this is for solaris/AIX etc. or is there a 3 party sw that can be used? i know in AIX6 this can be done but we are on AIX 5.3.x and 5.2.x (6 Replies)
Discussion started by: admaix
6 Replies

9. Solaris

PGP encryption/decryption solaris 9

Hi Someone is going to send me a file that they have encrypted by PGP encryption on windows pc to my solaris 9 server. They will give me the pgp key to decrypt the file. How can I do this on solaris 9 Is there a tool installed by default to decrypt or do I need to install something to... (0 Replies)
Discussion started by: frustrated1
0 Replies

10. Programming

Password encryption/decryption in flat-text files

Dear all, If anyone has some ideas for me how to tackle the following situation: Imagine a type of client-server application. The client application is started by a human operator with all the necessary LDAP/Kerberos in place. The server application is started automatically as a daemon process.... (2 Replies)
Discussion started by: domivv
2 Replies

Featured Tech Videos