|
You are here |
collantes.us | ||
| | | | |
alexcabal.com
|
|
| | | | | [AI summary] The provided text is a collection of user comments and discussions from a forum or blog post about using GnuPG (GPG) for secure communication. The main topic revolves around generating and managing cryptographic keys, particularly focusing on the use of master keys, subkeys, and key management practices such as secure deletion and exporting keys. The comments include discussions on key generation, key usage, keyserver interactions, and troubleshooting issues related to GPG operations. Some users also mention specific tools like Enigmail, Thunderbird, and the importance of secure key storage and deletion. The overall context is about best practices for key management and encryption in the context of digital communication security. | |
| | | | |
willhaley.com
|
|
| | | | | Encrypt and Decrypt a Single File on Linux with AES256 and GPG Encrypt gpg --cipher-algo AES256 --symmetric --output encrypted.file plain.file Decrypt gpg --output plain.file --decrypt encrypted.file Change the key file for a LUKS device cryptsetup luksChangeKey /dev/sdX --key-file /keys/old.keyfile /keys/new.keyfile Create a LUKS Encrypted Image Container File Create an empty 1GB img file dd if=/dev/zero of=encrypted.img bs=1 count=0 seek=1G Choose a keyfile that will be used to encrypt and unlock the image. Any regular file works as a key. A random key can be generated like so. | |
| | | | |
sergioprado.blog
|
|
| | | | | In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective. | |
| | | | |
www.schneier.com
|
|
| | | The U.S. National Institute of Standards and Technology is having a competition for a new cryptographic hash function. This matters. The phrase "one-way hash function" might sound arcane and geeky, but hash functions are the workhorses of modern cryptography. They provide web security in SSL. They help with key management in e-mail and voice encryption: PGP, Skype, all the others. They help make it harder to guess passwords. They're used in virtual private networks, help provide DNS security and ensure that your automatic software updates are legitimate. They provide all sorts of security functions in your operating system. Every time you do something with security on the internet, a hash function is involved somewhere... | ||