Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
08-08-2007, 06:37 AM
|
#1
|
Member
Registered: Aug 2007
Distribution: Gentoo 2007.0
Posts: 51
Rep:
|
gpg -c: which cipher-algo?
As far as using gpg -c, which is the best cipher algorithm to choose (best meaning strongest, not fastest)?
Is conventional (keyless) encryption considered secure? How does it match up to private key encryption?
What types of attacks are there that are used to crack conventionally encrypted files?
Does anyone know of any good resources (preferably not too heavily mathematical) where I can read more about this?
Thanks,
Mr. Snorfles
|
|
|
08-08-2007, 07:27 AM
|
#2
|
Member
Registered: Jun 2007
Location: Munich, Germany
Distribution: RHEL, CentOS, Fedora, SLES (...)
Posts: 399
Rep:
|
From the available ciphers (3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH)
I would prefer the Advanced Encryption Standard with 256 bits if I would need a high-level cryptography. Although I would use asymmetric encryption where possible.
|
|
|
08-08-2007, 07:30 AM
|
#3
|
Member
Registered: Aug 2007
Distribution: Gentoo 2007.0
Posts: 51
Original Poster
Rep:
|
Why AES256?
Why would you choose AES256 over the others? And what benefits are there for asymmetric encryption versus symmetric?
Which attacks make symmetric encryption more vulnerable?
--Mr. Snorfles
Last edited by mistersnorfles; 08-08-2007 at 07:31 AM.
|
|
|
08-08-2007, 01:00 PM
|
#4
|
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870
|
Quote:
Originally Posted by mistersnorfles
Why would you choose AES256 over the others?
|
Well, the choice comes down to personal preference, but if you read (for example) the Wikipedia page for AES you can get a good idea of why it's such a well-regarded block cipher.
Quote:
what benefits are there for asymmetric encryption versus symmetric?
Which attacks make symmetric encryption more vulnerable?
|
Once again, Wikipedia has a very informative page about this. There's also tons more info to be found via Google.
|
|
|
All times are GMT -5. The time now is 07:39 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|