|
NAMEaesget —
decrypt data using Rijndael, the Advanced Encryption Standard
winner
SYNOPSIS
DESCRIPTIONTheaesget utility decrypts data using the Rijndael
algorithm, the winner of the Advanced Encryption Standard (AES) competition.
The decryption is done in Cipher Block Feedback (CFB-128) mode, with the salt
read from the first 128 bits (16 bytes) of the encrypted data as generated by
the
aescrypt(1)
utility. The encrypted data (including the salt) is read from standard input
and the decrypted plaintext is written to standard output.
The decryption key may be read from standard input or from a file,
depending on the argument passed to the The decryption key may be 128, 192, or 256 bits long. By default,
the EXAMPLESDecrypt the contents of the /etc/hosts file with a key (128-bit by default) read from a file:aesget -k key.txt < hosts.aes >
hosts.txt Decrypt a file with a 192-bit key supplied directly: (echo
'012345678901234567890123456789012345678901234567'; cat test.aes) | ./aesget
-s 192 -k - SEE ALSOaescrypt(1)The SourceForge project page: http://sourceforge.net/projects/aescrypt/ HISTORYTheaesget utility was written by Eric
Lee Green, and was modified to use Rijndael rather than Twofish by
Randy Kaelber. It uses the freely available Rijndael
implementation by Antoon Bosselaers and
Vincent Rijmen. This manual page was written by
Peter Pentchev in 2008.
AUTHORSTheaesget utility - Eric Lee
Green ⟨eric@badtux.org⟩, Randy
Kaelber ⟨randyk@sourceforge.net⟩.
The manual page - Peter Pentchev ⟨roam@ringlet.net⟩.
Visit the GSP FreeBSD Man Page Interface. |