Full Disclosure mailing list archives
Re: Q: Linux Command Line Encryption
From: Aaron Horst <anthrax101 () gmail com>
Date: Mon, 25 Oct 2004 20:43:52 -0400
Decoding a file with repetitive XOR encryption is pretty easy. The only way that this will be even remotely secure is if the encrypted file is the same length or less then the length of the key file. The danger then becomes transmitting the key file securely. This is called a one-time pad. It is important that this key never be used again, or it can be cracked. Obviously, this is NOT a good idea for anything other then research purposes, but it is a good way to learn about the dangers of improper encryption. AnthraX101 On Mon, 25 Oct 2004 14:41:10 -0400, Mike Hoye <mhoye () neon polkaroo net> wrote:
On Mon, Oct 25, 2004 at 08:33:41AM -0700, Denis Dimick wrote:Use GPG and keychain to store the key.I've written a little widget that lets you "encrypt" a file using another file as the "key"; I put those things in quotes because it's a dumb little thing that does a quick-and-simple xor of the first file against the other. I realize that this is barely something you'd call encryption, but it might fill your needs. It's called xork and it comes with no warranty whatsoever. http://off.net/~mhoye/xork/ If anyone who is smarter than I am would like to suggest anything, I'd be glad to hear it. - Mike Hoye -- Whenever I hear the question "Did you reboot?", I think of frat guys in college saying "Didja fuck her?" - Scot Kurruk _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: Q: Linux Command Line Encryption, (continued)
- Re: Q: Linux Command Line Encryption Cedric Blancher (Oct 22)
- Re: Q: Linux Command Line Encryption Michael Rutledge (Oct 22)
- Re: Q: Linux Command Line Encryption Joe Szilagyi (Oct 22)
- Re: Q: Linux Command Line Encryption twebster (Oct 22)
- Re: Q: Linux Command Line Encryption Janusz A. Urbanowicz (Oct 24)
- Re: Q: Linux Command Line Encryption kf_lists (Oct 22)
- Re: Q: Linux Command Line Encryption Janusz A. Urbanowicz (Oct 22)
- Re: Q: Linux Command Line Encryption Bruno Wolff III (Oct 24)
- Re: Q: Linux Command Line Encryption Denis Dimick (Oct 25)
- Re: Q: Linux Command Line Encryption Mike Hoye (Oct 25)
- Re: Q: Linux Command Line Encryption Aaron Horst (Oct 25)
- Re: Q: Linux Command Line Encryption Ali Campbell (Oct 26)
- Re: Q: Linux Command Line Encryption Denis Dimick (Oct 25)