When you get around to decrypting the data, you'll be prompted for that passphrase. It goes without saying (but we'll say it anyway) that you should use a strong passphrase and don't forget what you chose!. This passphrase is used to help generate a key which is then used with the chosen algorithm to encrypt the data. You'll see something like this: Cypher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128, CAMELLIA192, CAMELLIA256Įach time you use a symmetric cipher to encrypt data, you'll be asked to supply a passphrase (twice to confirm it). The part your looking for uses the word "Cypher" rather than "cipher" (both are valid English, cipher is the American spelling). To see a list of available ciphers, run gpg -version If you just want to encrypt some files or data and don't want to set up a key pair (required for asymmetric encryption and digital signatures), then symmetric-key based cryptography is your answer.īelow, we'll cover several of the available ciphers including: AES256, TWOFISH, and CAMELLIA256. The reason the ciphers are called block ciphers is because the data to be encrypted is encrypted in chunks or blocks. The ciphers used for symmetric-key encryption use the same key for both the encryption and decryption stages. Another type of cryptographic solution provided by Gnu Privacy Guard (GPG) is symmetric-key encryption, also known as block cipher based encryption.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |