Questions tagged [cryptography]
Cryptography provides security mechanisms that are based on algorithmic methods and not on policy enforcement. For questions on cryptographic mechanisms and their application the Cryptography SE resp. the Information Security SE are most likely more appropriate. Don't use this tag if your question is about software that uses cryptographic mechanisms but not about cryptography itself.
86 questions
5
votes
1
answer
342
views
How to interpret the refcnt field in /proc/crypto?
Here's an example /proc/crypto entry:
name : md5
driver : md5-generic
module : kernel
priority : 0
refcnt : 1
selftest : passed
internal : no
type : shash
...
0
votes
1
answer
94
views
Ansible access to EL9 server after it is been 'ELevated' from EL8
Thanks for taking the time and having a look,
I recently ELevated (AlmaLinux project ELevate) 3 servers from AlmaLinux 8 to AlmaLinux 9 (2 years back these same servers were Elevated from CentOS 7 to ...
3
votes
0
answers
443
views
Can't import or create keys in Kleopatra in Arch Linux using KDE (x11)
I'm still new to linux, so please give me time if you need something from me.
As the title says I cannot create new key pairs or import existing keys into Kleopatra 3.2.0.240501 (24.05.1). I've just ...
2
votes
1
answer
243
views
Totally Legit Signing Key <[email protected]>
I run:
gpg --list-keys
I get:
pub rsa1024 2014-01-26 [C]
<REMOVED>
uid [ unknown] Totally Legit Signing Key <[email protected]>
Can this be dangerous? What is this? ...
3
votes
1
answer
495
views
Fast wideblock AES disk encryption in Linux?
I recently learned that Linux supports Adiantum as a disk encryption cipher (run cryptsetup benchmark -c xchacha20,aes-adiantum-plain64 to try it out on your system). While Adiantum is primarily meant ...
7
votes
1
answer
2k
views
Debian FIPS Certified
Is Debian OS FIPS certified? Does it support FIPS Validated Cryptographic Modules?
What I noticed is that FIPS mode can be enabled with the tool fips-mode-setup. This tool is developed and can be used ...
1
vote
2
answers
17k
views
What is the fingerprint ssh is asking for?
$ ssh 192.168.29.126
The authenticity of host '192.168.29.126 (192.168.29.126)' can't be established.
ECDSA key fingerprint is SHA256:1RG/OFcYAVv57kcP784oaoeHcwjvHDAgtTFBckveoHE.
Are you sure you want ...
21
votes
3
answers
5k
views
How can I force /dev/random to block?
For a class on cryptography, I am trying to drain the entropy pool in Linux (e.g. make /proc/sys/kernel/random/entropy_avail go to 0 and block a command reading from /dev/random) but I can't make it ...
0
votes
0
answers
755
views
xdg-open gives error : FIPS violation detected at crypto/evp/digest.c:219, reason: SHA-1 hash algorithm is not allowed in FIPS mode
As seen from var/log/messages when i xdg open is triggered from the browser:
Aug 14 11:01:43 centos org.gnome.Shell.desktop[1833986]: FIPS violation detected at crypto/evp/digest.c:219, reason: SHA-1 ...
1
vote
1
answer
124
views
GnuPG support for ISA crypto extensions
For performing some results comparison, I was searching online for usages of 'gpg' command with hardware crypto extensions enabled/disabled (eg. AES-NI and ARM NEON), but found none. Instead I find a ...
3
votes
3
answers
8k
views
How to show the incorrect checksum when the computed checksum did not match
Suppose I try to verify the checksum of a file using:
echo '760382d5e8cdc5d0d079e8f754bce1136fbe1473be24bb885669b0e38fc56aa3 emacs-26.1.tar.gz' | \
sha256sum --check
If the file is corrupt and the ...
1
vote
0
answers
178
views
Error running outguess on Linux terminal in windows
So far I was able to get outguess installed on my Ubuntu distribution running under WSL by running
sudo apt-get update
and then
sudo apt-install -y outguess
Both commands worked fine. After, I tried ...
0
votes
2
answers
136
views
How to verify a public(facebook's) key ? and then sign and trust them
Recently I enabled gpp emails option in facebook. Then they sent me a test mail to check whether I'm able to decrypt that or not.
So first I downloaded there public key from Here and imported in my ...
0
votes
2
answers
368
views
Implementing a token solution on a usb key
I would like to implement a token solution for USB devices.
So I need to encrypt a token with a private key and use the public key to decrypt it. So far so good. The problem comes from the fact that I ...
0
votes
3
answers
2k
views
Unable to install cryptography
Lubuntu version: 20.04
I am trying to ssh to a cluster using fab but it returns an error.
I am adding a screenshot showing the traceback .
I am not able to install cryptography through terminal by ...
2
votes
2
answers
2k
views
How can I disallow certain ciphers for OpenSSH in Fedora, using crypto policies?
I would like to disallow certain ciphers for OpenSSH in Fedora.
I've read that Fedora overrides settings in sshd_config with its crypto policies.
I'd like to edit those.
My first idea would be to ...
0
votes
0
answers
1k
views
Is there any way to get algorithm of any Encrypted String?
File command shows that the file is of any type of ELF, Text, Ascii, source code. Is any there any command or tool to identify the possible encryption algorithm for a given String? or to find possible ...
1
vote
1
answer
231
views
Linux Kernel Development Support for RSA Encryption [closed]
I am working on a prototype, and I'm new to Linux Kernel Development. I see that the Linux Kernel has a crypto module, but I am not sure if it supports Asymmetric Encryption such as RSA.
3
votes
1
answer
1k
views
scrypt key calculator
scrypt is a password-based key derivation function that can be tuned to use a large amount of memory.
I want a command-line interface to calculate the key given my own values for parameters: password,...
1
vote
0
answers
314
views
LUKS secure automated decryption
I have critical data, let's say machine learning code, GPG keys,... etc.
I would like to create a workstation that will work somewhere else- in someone else's premises.
I don't have concern that ...
2
votes
2
answers
4k
views
SHA-512 password stored as non-hex string
I feel like this is so obvious that searching on the Internet doesn't show any results about my problem. I'm looking at the root password in /etc/shadow, which looks something like:
$6$Etg2ExUZ$...
2
votes
0
answers
376
views
bash tab auto-complete for java keytool
Can anyone point me to a bash tab autocomplete for the java keytool command?
Learning & writing this seems not simple, and I presume that someone has felt this pain before.
0
votes
1
answer
463
views
Linux screen lock security [closed]
How secure is relying on the default screen lock in linux? What stops an attacker for just plugging a device that bruteforces the passord check? How secure should be my linux account password?
22
votes
2
answers
26k
views
What is the difference between /etc/ssh/ and ~/.ssh?
I’m having fun with OpenSSH, and I know the /etc/ssh directory is for the ssh daemon and the ~/.ssh directory is for a particular user.
Both directories contain private and public keys:
But what is ...
0
votes
1
answer
848
views
EFS replacement on Ubuntu
I'm considering switching from Windows Server to Ubuntu Server. One of feature that I can't figure out is - what should I use instead of NTFS Encryption (EFS). So, basically, what I need:
1) This ...