Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
-1
votes
2 answers

Disabling SHA in IIS

My company has a web server running IIS 6, and was asked to help disable SHA on it. Specifically this cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA I found these instructions…
AndyD273
  • 207
  • 1
  • 11
-1
votes
1 answer

When was LUKS first released?

When was Linux Unified Key Setup (LUKS) first released--both as an open standard and later made available as an implementation with cryptsetup?
Michael Altfield
  • 739
  • 2
  • 8
  • 23
-2
votes
1 answer

making it impossible to change a secure key passphrase

According to this: How do I change my private key passphrase? it is possible to change your private RSA/DSA key passphrase any time. Is there a way to generate a key with a passphrase that is set once and can not be altered?
-2
votes
2 answers

Copy Files from one Linux server to another with Encryption

When copying files from one Linux server to another, the files should be encrypted. The logs should maintain the record of files and their uploader's IP address. The problem with ftp is they send passwords in plain text but the plus point is that…
-2
votes
1 answer

Generating public/private credentials for MS Outlook email encryption

An app running on a CentOS 7 web server needs to receive encrypted emails sent from users of MS Outlook. Can someone please provide explicit instructions as to how I can generate or procure all of the credentials that those Outlook users will need…
CodeMed
  • 315
  • 1
  • 8
  • 21
-2
votes
1 answer

How to verify whether randomness was written to a device and what exactly has been written?

I am preparing a device with shred to use it later on encrypted with dm-crypt/cryptsetup/luks. How can I check the device before and after using shred or e.g openssl/dd with /dev/urandom to be sure what was done? Is there a possibility?
John Jane
  • 1
  • 4
-2
votes
1 answer

mkpasswd on Centos 7 does not support -m flag

I cannot find how to install grub-crypt either. How can I generate SHA512 pass hashes on Centos 7? Edit: I was actually trying to look up how to generate hashes with an adjustable number of rounds. I had done this before but couldn't remember how I…
Steven Lu
  • 268
  • 1
  • 4
  • 12
-2
votes
1 answer

Speedup of fixing an openssl bug with 8192 bit key

This is related to this Bug-Report https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747453 OpenSSL contains a set of arbitrary limitations on the size of accepted key parameters that make unrelated software fail to establish secure connections.…
rubo77
  • 2,469
  • 4
  • 34
  • 66
-2
votes
2 answers

How does The Pirate Bay mask itself from its VPS providers?

From https://torrentfreak.com/pirate-bay-moves-to-the-cloud-becomes-raid-proof-121017/ The hosting providers have no idea that they’re hosting The Pirate Bay, and even in the event they found out it would be impossible for them to gather data on…
Ansis Māliņš
  • 175
  • 1
  • 10
-2
votes
2 answers

How can system admins track employees Gmail chat

I am in a company where i have been warned about using chats. I spoke with one of the admin and he said every chat is being Monitored; ok i agree it can be if we use plain text but what if we use ssl. i used tcpdump while chatting in gmail but i…
Kevin Parker
  • 757
  • 1
  • 13
  • 32
-2
votes
1 answer

On the fly encryption of data ( not your average type)

I'm looking to build my first nas. And i intend to connect over the internet to it. Because i will have some work documents too on it i want to make it as secure as possible. I have no particular preference for the nas OS (other than it be…
Crobb
  • 1
-2
votes
4 answers

How long should a password be, for filesystem encryption?

I want to encrypt my filesystem with encfs, but I don't know how long my password should be. I'm gonna be using AES 256, with blocks of 4096 bits. How many guesses per second can I expect an attacker can make on files encrypted with that? I'm…
HappyDeveloper
  • 654
  • 2
  • 6
  • 13
-2
votes
1 answer

How does a certificate make a server HTTPS?

I've read plenty but i'm still very confused about the server certificate concept. At what stage does it turn a glassfish server from HTTP to HTTPS and how? I know how to create a certificate with keytool, but what happens to it after that? I read…
user666254
-2
votes
1 answer

How to host encrypted users' files in a way that I won't be able to read them?

I am making plans for a new project and looking for a way to allow users upload their files and keep them encrypted and only accessible by them, but at the same time I need their contacts to access the files too. To explain a little bit more: User…
CDoc
  • 111
  • 4
-3
votes
1 answer

How can I upload an SSH key to a system that doesn't use passwords?

I would like to create a public/private keypair and upload the public key to a server that I want to log onto. However, that server has already been configured to allow no password authentication of any kind - only key based authentication is…
user227963
  • 209
  • 1
  • 2
  • 11
1 2 3
51
52