Questions tagged [file-encryption]

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

471 questions
23
votes
2 answers

Do Veracrypt encrypted volumes have any kind of brute force protection?

I have a 10mb encrypted volume which I made with Veracrypt and was planning to upload it to the internet. I have a pretty strong password but was worried about its protection against brute force attacks. After searching this SE it seems like a…
Eka
  • 559
  • 1
  • 5
  • 15
21
votes
9 answers

Keep encrypted files in sync on a cloud service, without having to upload an entire encrypted volume each time

Situation: User has several folders worth of GBs which they want to keep in sync on a cloud service (for example Mega or Dropbox) in an encrypted form; User does not want to sync a single encrypted volume, because this would mean, obviously,…
nico
  • 341
  • 1
  • 2
  • 9
21
votes
3 answers

Would it be plausible to write your own anti-crypto-ransomware tool?

Question After reading about how basic ransomware targets and encrypts your files. I was wondering if it would be plausible to write your own script to try and detect such activities? Initial Research Effort I have looked at different ideas people…
Chris
  • 735
  • 7
  • 15
20
votes
3 answers

Not understanding why I should use public/private key encryption over password?

My knowledge about these topics is very elementary, please "school me" if I said something completely wrong, it would surely help me understand these things better. Now, to my issue. Now that I have a laptop and didn't encrypt the entire disk during…
19
votes
8 answers

Are there any "real world" implementations of secret-sharing encryption schemes?

Imagine something like TrueCrypt where user A can decrypt his files, or any 3 of the 10 directors in his organization can decrypt user A's files. As I understand it this is similar to the way the DNSSEC Root Keys are secured. Obligatory wiki…
scuzzy-delta
  • 9,303
  • 3
  • 33
  • 54
18
votes
5 answers

Encrypting files in a windows environment

We have certain client data which must be encrypted at all times. The part we have been struggling with is encrypting files on network shares. Currently we have network folders encrypted using PGP Netshare. This works pretty well for file…
Brettski
  • 521
  • 3
  • 8
  • 14
17
votes
4 answers

What are you doing when you move your mouse randomly during a truecrypt volume creation?

Is that called a 'round' every time you move your mouse when creating a new volume? I'm talking about the screen with the random numbers during the volume creation process. What is the purpose of doing the random movement? I saw Lastpass is now…
v15
  • 1,741
  • 4
  • 16
  • 18
16
votes
5 answers

VeraCrypt/TruCrypt - I can't understand why you'd want to create a "hidden" volume...?

I can't think of a reason as to why you'd want to create a hidden volume in VeraCrypt. It says because "you may be asked to hand the information," but why would I need to hand it over? Nobody has any proof of what may or may not be in that volume,…
Jack
  • 421
  • 2
  • 4
  • 10
16
votes
2 answers

Simple way to encrypt files on Linux and decrypt on Windows?

We are in need of an encryption process for backups of very valuable data. This data will be stored on a distributed filesystem, so even with permissions set right, it's not out of reach that this data is copied or read. I'm searching for a…
josen
  • 161
  • 1
  • 1
  • 3
15
votes
3 answers

Is it possible to use SSH agent for generic data encryption?

Is it possible to use running SSH agent to decrypt some data (supplied as a string or read from file)?
15
votes
4 answers

What's the standard way to encrypt a file with a public key in Java?

I'm writing a client app in Java that sends encrypted data back to the server. All clients have my RSA public key. Is there a standard way to encrypt a given file with it to send it back to the server? From websites such as this one, I gather that…
14
votes
4 answers

Encrypting data by parts vs encrypting the whole data

Suppose I have a file with records, and I have two options to encrypt it: encrypt the file as a whole encrypt each record separately and store them together. Which way is generally preferable and why? For example, I think the second approach is…
Andrew T
  • 241
  • 1
  • 5
14
votes
1 answer

Forgot password to 7-Zip archive

I think I already know the answer to this question, but I thought I'd ask the experts anyway. A few months back, I created a password-protected 7-Zip archive which housed the source code of a simple program I was writing at the time. I was using the…
Matthew
  • 343
  • 1
  • 2
  • 7
14
votes
3 answers

How long should zip encryption password be for it take 10 years to crack?

I am using zip 3.0.0 on macOS High Sierra and Ubuntu. Here is my zip version on macOS: $ zip --version | head Copyright (c) 1990-2008 Info-ZIP - Type 'zip "-L"' for software license. This is Zip 3.0 (July 5th 2008), by Info-ZIP. Currently maintained…
Lone Learner
  • 968
  • 1
  • 9
  • 18
13
votes
1 answer

Secure backup encryption with OpenSSL

I know, the general advice is "keep your hands off crypto stuff". And the standard way to encrypt backup data securely would be using GnuPG. However, for a rather academic exercise, I would like to think through a protocol that would work just with…
Daemotron
  • 131
  • 6
1
2
3
31 32