|
NAMEaescrypt —
encrypt data using Rijndael, the Advanced Encryption Standard
winner
SYNOPSIS
DESCRIPTIONTheaescrypt utility encrypts data using the Rijndael
algorithm, the winner of the Advanced Encryption Standard (AES) competition.
The encryption is done in Cipher Block Feedback (CFB-128) mode, with the salt
randomly generated from data read from the
/dev/urandom device. The plaintext data is read from
standard input and the encrypted data is written to standard output.
The encryption key may be read from standard input or from a file,
depending on the argument passed to the The encryption key may be 128, 192, or 256 bits long. By default,
the The EXAMPLESGenerate a random 128-bit value and store it into a keyfile suitable for theaescrypt utility:
perl -e 'open(F, "<",
"/dev/random") or die("$!\n"); read(F, $s, 32); print
"kk=".unpack("H*", $s)."\n"' Encrypt the contents of the /etc/hosts file with the generated (128-bit by default) key: aescrypt -k key.txt < /etc/hosts
> hosts.aes Encrypt a string with a 192-bit key supplied directly: (echo
'012345678901234567890123456789012345678901234567'; echo 'This is a test.') |
./aescrypt -s 192 -k - > test.aes SEE ALSOaesget(1)The SourceForge project page: http://sourceforge.net/projects/aescrypt/ HISTORYTheaescrypt utility was written by
Eric Lee Green, and was modified to use Rijndael
rather than Twofish by Randy Kaelber. It uses the
freely available Rijndael implementation by Antoon
Bosselaers and Vincent Rijmen. This manual page
was written by Peter Pentchev in 2008.
AUTHORSTheaescrypt utility - Eric Lee
Green ⟨eric@badtux.org⟩, Randy
Kaelber ⟨randyk@sourceforge.net⟩.
The manual page - Peter Pentchev ⟨roam@ringlet.net⟩.
Visit the GSP FreeBSD Man Page Interface. |