Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
bcrypt uses blowfish
ccrypt uses AES
gpg uses any of ElGamal, DSA, RSA, AES, 3DES, Blowfish, Twofish, CAST5, MD5, SHA-1, RIPE-MD-160 and TIGER
there are plenty of academic discussions about the best encryption algorithms - both blowfish and AES are excellent hash algs and I have no opinion on which is better. gpg is very flexible. also, gpg has been around for a number of years, has been widely used and well vetted. Many people consider a robust history to be an important security consideration. It also supports PKI (much better than simple password encryption).
personally I use gpg, but I use it largely to encrypt single files and email.
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660
Rep:
Blowfish and AES are both encryption algorithms, not hashing algorithms. Blowfish has been adapted to a password hashing algorithm, but that's not what it was original designed for. You cannot use MD5 or SHA1 to encrypt data, since they are strictly hashing algorithms. The terms are not interchangeable.
Thanks. The more I learn about security related issues, the more fascinating I am with it. There is so much more the just a simple firewall and some virus/rootkit/port/etc scanners. I find myself getting side tracked from some other stuff I was going to do and reading up on this even more.
Honestly, if I never used Linux I doubt I would have ever became interested in it. I would have been to busy keeping my MS system running smoothly, lol.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.