Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
10
votes
1 answer

Reboot Encrypted System Remotely Without Password Query

Are there any standard solutions to rebooting an encrypted system remotely without requiring a password on the next boot? The system in question is an Ubuntu encrypted with LUKS root partition and an unencrypted boot partition. The only way I can…
Elmar Weber
  • 492
  • 1
  • 7
  • 18
10
votes
3 answers

MySQL Encryption and Key management

I am developing a local intranet system in PHP/MySQL to manage our client data. It seems that the best practice would be to encrypt the sensitive data on the MySQL server as it is being entered. I am not clear, though, on what would be the best way…
stormdrain
  • 1,439
  • 7
  • 28
  • 52
9
votes
4 answers

Is it ok to use self-signed certificates for smtp transport?

By "by ok to use" I mean: are MTA agents receiving emails from my server going to reject my email if not, are they going to make other kind of bad treatment for my emails (marking as spam, unsafe and so...)? ...or is it just better idea to stick…
Miloš Đakonović
  • 682
  • 3
  • 9
  • 28
9
votes
3 answers

RSA or DSA: What's the definitive answer when generating SSH key pairs?

Possible Duplicate: SSH keypair generation: RSA or DSA? Some say use RSA, some say use DSA, some say it doesn't matter. Some say one is more secure than the other, some say the reverse. Some say it's a patent issue. So, what's the real story…
kch
  • 4,592
  • 3
  • 20
  • 17
9
votes
9 answers

Configured MySQL for SSL , but SSL is still DISABLED..!

I configured SSL for MySQL using the following script. #!/bin/bash # mkdir -p /root/abc/ssl_certs cd /root/abc/ssl_certs # echo "--> 1. Create CA cert, private key" openssl genrsa 2048 > ca-key.pem echo "--> 2. Create CA cert, certificate" openssl…
Sunrays
  • 128
  • 1
  • 1
  • 9
9
votes
2 answers

Two SSL certificates with same key

If I generate two SSL certificates using the same key, am I diluting the strength of the certificates? (does it open the door for cryptanalysis or a possibility of compromising data across that channel)? Thanks
Wadih M.
  • 1,032
  • 1
  • 10
  • 18
9
votes
3 answers

Why does a web server's public key certificate have to be signed by a certificate authority?

In other words, what would be the security risk of not signing public key certificates by certificate authorites (from a user perspective)? I mean, the data is still encrypted... What could a man in the middle do with a non signed certificate?
Olivier Lalonde
  • 753
  • 3
  • 13
  • 20
8
votes
4 answers

Samba SMB Encryption - How safe is it?

I recently set up a Samba server on Linux that allows me to access files on this server on Win10 PCs in my local network. But I wondered if I could access this shared drive over the internet since I also use a Win10 PC at school. I set the following…
Robin Mayer
  • 81
  • 1
  • 1
  • 2
8
votes
2 answers

Can Squid be used as "TLS termination proxy" to encrypt TCP connections using client certificates?

Abstract I need an encrypted TCP connection from multiple clients to a single port over the internet. Can this be realized with Squid? Concrete situation We use a monitoring and client management solution in our company which is accessible over…
marsh-wiggle
  • 2,145
  • 5
  • 29
  • 45
8
votes
1 answer

Outlook 2010 cannot reply to encrypted email

A coworker and I occasionally use encrypted email to send passwords. We both are using Outlook 2010, and both of our Digital IDs were created by the same authority. For my coworker, creating, replying, and reading my encrypted emails works just…
TTT
  • 736
  • 4
  • 10
8
votes
3 answers

How secure are password-protected WinRAR archives?

The web seems to be flooded by password removers. I'm however on the other side. I'm interested in security of my files. If I have a WinRAR archive (> 1 Mbyte) and use a password (> 6 characters length with non-alphanumeric characters), how secure…
Mastermind
  • 354
  • 3
  • 4
  • 10
8
votes
2 answers

Linux LTO-4/5/6 Hardware AES Drive Encryption

For a number of reasons I have been trying to find a way to encrypt my backup tapes. I'm currently running Bacula for my backups and it's support for Drive based encryption is I have to call a script or something to set the key in the drive. How…
Squidly
  • 1,765
  • 1
  • 14
  • 18
8
votes
1 answer

What kind of algorithm does .htpasswd uses?

I am trying to generate this kind of hashes programmatically: axF3s9cdEnsNP But I can't identify what kind of hash it is. The hash comes from a .htpasswd file. All the online htpasswd generators I tried generates different type of hashes.
trevhas
  • 83
  • 1
  • 3
8
votes
3 answers

What's the best practice for taking MySQL dump, encrypting it and then pushing to s3?

This current project requires that the DB be dumped, encrypted and pushed to s3. I'm wondering what might be some "best practices" for such a task. As of now I'm using a pretty straight ahead method but would like to have some better ideas where…
J. LaRosee
  • 183
  • 1
  • 5
8
votes
5 answers

OSX - Full Disk Encryption

What options are available for OSX full disk encryption? Which of them is the best?
user4120