What New Algorithms Encryption File Software of the best 2015?
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
What New Algorithms Encryption File Software of the best 2015?
Hi ,
basic user is use blowfish and aes encryption file , but this is old algorithms , i saw new algorithms have Yarrow - Fortuna - Threefish - Skein , but i can't saw this software .
Security is a process - what is secure today may not be secure tomorrow. Also what smallpond said. In case of encryption algorithms it's better to use old and proven stuff than the newer and shiny stuff.
But generally you should be fine with AES or any AES candidates (use cascades, if you're paranoid). For hash you should use at least SHA256 (SHA512, if you're paranoid) and remember to salt and pepper your passwords when implementing access restrictions.
Generally speaking, it is not the algorithm that's the weakness, but rather the (human) process that surrounds it.
The Enigma system was plenty secure-enough for its day, but its keying system was weak, and that's how it was catastrophically broken. The original WEP-key system for wireless could also be broken just by sampling a few minutes' traffic. (And too-many computers are wide open to anyone else in that coffee shop. Have you noticed how many places offer "free wireless," and have you ever seriously-considered why?
Any "password" is weak, even if you do the whole Waffle House treatment ("scattered, smothered, etc. ...") on it. Whereas, a unique digital certificate is strong ... i-f it can be secured, if your employees can actually be trusted, if you don't put your data "in the cloud" or hire the cheapest programmers you can find on Planet Earth.
If you study any crypto protocol, you'll see that it is soup-to-nuts, and that "cipher algorithms" are actually part of the negotiation. The focus of the protocol is on how the algorithms are used.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.