[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ab13993b041025174355a9e766@mail.gmail.com>
From: anthrax101 at gmail.com (Aaron Horst)
Subject: Q: Linux Command Line Encryption
Decoding a file with repetitive XOR encryption is pretty easy. The
only way that this will be even remotely secure is if the encrypted
file is the same length or less then the length of the key file. The
danger then becomes transmitting the key file securely. This is called
a one-time pad. It is important that this key never be used again, or
it can be cracked.
Obviously, this is NOT a good idea for anything other then research
purposes, but it is a good way to learn about the dangers of improper
encryption.
AnthraX101
On Mon, 25 Oct 2004 14:41:10 -0400, Mike Hoye <mhoye@...n.polkaroo.net> wrote:
> On Mon, Oct 25, 2004 at 08:33:41AM -0700, Denis Dimick wrote:
> > Use GPG and keychain to store the key.
>
> I've written a little widget that lets you "encrypt" a file using
> another file as the "key"; I put those things in quotes because
> it's a dumb little thing that does a quick-and-simple xor of the
> first file against the other. I realize that this is barely
> something you'd call encryption, but it might fill your needs.
>
> It's called xork and it comes with no warranty whatsoever.
>
> http://off.net/~mhoye/xork/
>
> If anyone who is smarter than I am would like to suggest anything,
> I'd be glad to hear it.
>
> - Mike Hoye
>
> --
> Whenever I hear the question "Did you reboot?", I think of frat guys
> in college saying "Didja fuck her?" - Scot Kurruk
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists