Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Q: Linux Command Line Encryption
From: Aaron Horst <anthrax101 () gmail com>
Date: Mon, 25 Oct 2004 20:43:52 -0400

Decoding a file with repetitive XOR encryption is pretty easy. The
only way that this will be even remotely secure is if the encrypted
file is the same length or less then the length of the key file. The
danger then becomes transmitting the key file securely. This is called
a one-time pad. It is important that this key never be used again, or
it can be cracked.

Obviously, this is NOT a good idea for anything other then research
purposes, but it is a good way to learn about the dangers of improper


On Mon, 25 Oct 2004 14:41:10 -0400, Mike Hoye <mhoye () neon polkaroo net> wrote:
On Mon, Oct 25, 2004 at 08:33:41AM -0700, Denis Dimick wrote:
Use GPG and keychain to store the key.

I've written a little widget that lets you "encrypt" a file using
another file as the "key"; I put those things in quotes because
it's a dumb little thing that does a quick-and-simple xor of the
first file against the other. I realize that this is barely
something you'd call encryption, but it might fill your needs.

It's called xork and it comes with no warranty whatsoever.


If anyone who is smarter than I am would like to suggest anything,
I'd be glad to hear it.

- Mike Hoye

Whenever I hear the question "Did you reboot?", I think of frat guys
in college saying "Didja fuck her?" - Scot Kurruk

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]