Blowfish cipher is not recommended since the time it was figured that the cipher algorithm can be attacked. bcryptīcrypt is a key derivation function which is based upon Blowfish cipher. Note: You need to provide the same password you gave at encryption to decrypt when prompted. Now, if you want to decrypt the above encrypted file, you may use the following command, but before we start decrypting we will first remove the original file i.e., tecmint.txt and leave the encrypted file untouched. To see all the encryption algorithm present you may fire. You may specify a different algorithm optionally. The above encryption was done with CAST5 encryption algorithm automatically. Note: Enter Paraphrase twice to encrypt the given file. You may list the content of the directory to verify. As soon as you run the gpc command with option -c (encryption only with symmetric cipher) it will create a file. We have a text file ( tecmint.txt) located at ~/Desktop/Tecmint/, which will be used in the examples that follows this article.īefore moving further, check the content of the text file. In most of the today’s Linux distributions, the gnupg package comes by default, if in-case it’s not installed you may apt or yum it from repository.
0 Comments
Leave a Reply. |