Skip to main content

Questions tagged [cryptography]

Cryptography provides security mechanisms that are based on algorithmic methods and not on policy enforcement. For questions on cryptographic mechanisms and their application the Cryptography SE resp. the Information Security SE are most likely more appropriate. Don't use this tag if your question is about software that uses cryptographic mechanisms but not about cryptography itself.

Filter by
Sorted by
Tagged with
5 votes
1 answer
342 views

Here's an example /proc/crypto entry: name : md5 driver : md5-generic module : kernel priority : 0 refcnt : 1 selftest : passed internal : no type : shash ...
asizo's user avatar
  • 61
0 votes
1 answer
94 views

Thanks for taking the time and having a look, I recently ELevated (AlmaLinux project ELevate) 3 servers from AlmaLinux 8 to AlmaLinux 9 (2 years back these same servers were Elevated from CentOS 7 to ...
Stefan Lelieveld's user avatar
3 votes
0 answers
443 views

I'm still new to linux, so please give me time if you need something from me. As the title says I cannot create new key pairs or import existing keys into Kleopatra 3.2.0.240501 (24.05.1). I've just ...
TheBros47874's user avatar
2 votes
1 answer
243 views

I run: gpg --list-keys I get: pub rsa1024 2014-01-26 [C] <REMOVED> uid [ unknown] Totally Legit Signing Key <[email protected]> Can this be dangerous? What is this? ...
Ohumeronen's user avatar
3 votes
1 answer
495 views

I recently learned that Linux supports Adiantum as a disk encryption cipher (run cryptsetup benchmark -c xchacha20,aes-adiantum-plain64 to try it out on your system). While Adiantum is primarily meant ...
JanKanis's user avatar
  • 1,451
7 votes
1 answer
2k views

Is Debian OS FIPS certified? Does it support FIPS Validated Cryptographic Modules? What I noticed is that FIPS mode can be enabled with the tool fips-mode-setup. This tool is developed and can be used ...
Milica's user avatar
  • 71
1 vote
2 answers
17k views

$ ssh 192.168.29.126 The authenticity of host '192.168.29.126 (192.168.29.126)' can't be established. ECDSA key fingerprint is SHA256:1RG/OFcYAVv57kcP784oaoeHcwjvHDAgtTFBckveoHE. Are you sure you want ...
john stark's user avatar
21 votes
3 answers
5k views

For a class on cryptography, I am trying to drain the entropy pool in Linux (e.g. make /proc/sys/kernel/random/entropy_avail go to 0 and block a command reading from /dev/random) but I can't make it ...
John Phillips's user avatar
0 votes
0 answers
755 views

As seen from var/log/messages when i xdg open is triggered from the browser: Aug 14 11:01:43 centos org.gnome.Shell.desktop[1833986]: FIPS violation detected at crypto/evp/digest.c:219, reason: SHA-1 ...
munish's user avatar
  • 8,237
1 vote
1 answer
124 views

For performing some results comparison, I was searching online for usages of 'gpg' command with hardware crypto extensions enabled/disabled (eg. AES-NI and ARM NEON), but found none. Instead I find a ...
Sunanda Roy's user avatar
3 votes
3 answers
8k views

Suppose I try to verify the checksum of a file using: echo '760382d5e8cdc5d0d079e8f754bce1136fbe1473be24bb885669b0e38fc56aa3 emacs-26.1.tar.gz' | \ sha256sum --check If the file is corrupt and the ...
Flux's user avatar
  • 3,318
1 vote
0 answers
178 views

So far I was able to get outguess installed on my Ubuntu distribution running under WSL by running sudo apt-get update and then sudo apt-install -y outguess Both commands worked fine. After, I tried ...
PK268's user avatar
  • 11
0 votes
2 answers
136 views

Recently I enabled gpp emails option in facebook. Then they sent me a test mail to check whether I'm able to decrypt that or not. So first I downloaded there public key from Here and imported in my ...
Nikhil Badyal's user avatar
0 votes
2 answers
368 views

I would like to implement a token solution for USB devices. So I need to encrypt a token with a private key and use the public key to decrypt it. So far so good. The problem comes from the fact that I ...
Rig0L's user avatar
  • 41
0 votes
3 answers
2k views

Lubuntu version: 20.04 I am trying to ssh to a cluster using fab but it returns an error. I am adding a screenshot showing the traceback . I am not able to install cryptography through terminal by ...
Nauman Sohail's user avatar
2 votes
2 answers
2k views

I would like to disallow certain ciphers for OpenSSH in Fedora. I've read that Fedora overrides settings in sshd_config with its crypto policies. I'd like to edit those. My first idea would be to ...
markonius's user avatar
  • 387
0 votes
0 answers
1k views

File command shows that the file is of any type of ELF, Text, Ascii, source code. Is any there any command or tool to identify the possible encryption algorithm for a given String? or to find possible ...
Ashish Pawar's user avatar
1 vote
1 answer
231 views

I am working on a prototype, and I'm new to Linux Kernel Development. I see that the Linux Kernel has a crypto module, but I am not sure if it supports Asymmetric Encryption such as RSA.
Gary Drocella's user avatar
3 votes
1 answer
1k views

scrypt is a password-based key derivation function that can be tuned to use a large amount of memory. I want a command-line interface to calculate the key given my own values for parameters: password,...
wjwrpoyob's user avatar
  • 460
1 vote
0 answers
314 views

I have critical data, let's say machine learning code, GPG keys,... etc. I would like to create a workstation that will work somewhere else- in someone else's premises. I don't have concern that ...
Kamil's user avatar
  • 1,521
2 votes
2 answers
4k views

I feel like this is so obvious that searching on the Internet doesn't show any results about my problem. I'm looking at the root password in /etc/shadow, which looks something like: $6$Etg2ExUZ$...
Andrés's user avatar
  • 31
2 votes
0 answers
376 views

Can anyone point me to a bash tab autocomplete for the java keytool command? Learning & writing this seems not simple, and I presume that someone has felt this pain before.
Frischling's user avatar
0 votes
1 answer
463 views

How secure is relying on the default screen lock in linux? What stops an attacker for just plugging a device that bruteforces the passord check? How secure should be my linux account password?
qleguennec's user avatar
22 votes
2 answers
26k views

I’m having fun with OpenSSH, and I know the /etc/ssh directory is for the ssh daemon and the ~/.ssh directory is for a particular user. Both directories contain private and public keys: But what is ...
Kavish Gour's user avatar
0 votes
1 answer
848 views

I'm considering switching from Windows Server to Ubuntu Server. One of feature that I can't figure out is - what should I use instead of NTFS Encryption (EFS). So, basically, what I need: 1) This ...
Dmitry Gusarov's user avatar