![]() ![]() NOTE: the password that you enter here will be processed by one MD5 iteration 1. It's free (in money and in freedom), unlike Truecrypt, which is only free in money. Old answer for users who are able to chose good keys, see note belowįor single files, openssl is very useful, especially when sending the file over an unsecured channel (e.g. In order to avoid that, use -no-symkey-cache option as described in a related answer. Note that gpg caches the symkey by default (documented behavior). Example usage of symmetric encryption: gpg -symmetric encrypted_fileĭecryption: gpg -decrypt decrypted_file Thus, an encryption scheme using passwords should use a key-derivation function that takes more resources (time, memory) to slow down brute-force attacks.įor a description of GnuPG's KDF, see this Crypto Stack Exchange post. It is important to realize that most people are very bad at choosing strong passwords. See djeikyb answer on this page for asymmetric key usage.įor symmetric encryption, the encryption and decryption keys are equal. ![]() Asymmetric crypto involves a two keys, a public key for encryption and a private key for decryption.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |