Questions tagged [file-encryption]

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

471 questions
13
votes
6 answers

Whats the point in having software's like Veracrypt, which end of the day needs password to decrypt?

There are encryption softwares like Veracrypt which encrypt data and the only way to open encrypted file is via password, but a simple compressing softwares like RAR also provide password protection. Now the problem with password is that: it can…
Red Aura
  • 257
  • 1
  • 2
  • 5
13
votes
5 answers

How can I decrypt data with Java, without hard-coding the key?

I hope this is not a chicken-egg problem or reinventing the wheel but here goes. I have a Java application that needs to access a password protected file (actually during the application startup). The password protected file's path that it is…
Jim
  • 1,395
  • 4
  • 13
  • 18
13
votes
5 answers

Good file encryption tools

Could you please help me find a good file encryption tool? The target OS is Linux, but tools for Windows are welcome, too. FOSS tools are preferred. The tool must be reliable both for the recovery of the original data (on decryption) and…
ML--
  • 239
  • 1
  • 2
  • 5
13
votes
2 answers

Is ccrypt 'AES 256' file encryption fundamentally flawed

The unix/linux utility ccrypt claims to be a more secure replacement for the old unix crypt. However it seems to me that it has a fundamental flaw. When you encrypt a file using ccrypt it uses the password you provide to create a random 256-bit key…
Chris Green
  • 331
  • 2
  • 6
12
votes
6 answers

How to protect against adversaries snatching booted laptops to defeat full disk encryption?

I read an article describing how FBI agents snatched Ross Ulbricht's laptop while it was running to defeat full-disk encryption: Two plainclothes FBI agents, one male and one female, walked up behind Ulbricht and began arguing loudly. This staged…
James Mishra
  • 1,124
  • 6
  • 12
12
votes
5 answers

Security of using passwords or even passphrases to encrypt files

Is it ever appropriate to use real-world passwords to encrypt files to be sent via unsecure means. By real world, I mean a password that is memorable and memorisable by a mere person? I am implying that in order to securely encrypt a file you must…
Andrew Russell
  • 3,633
  • 1
  • 20
  • 29
12
votes
1 answer

Why is GPG file encryption so much slower than other AES implementations?

Correct me if I'm wrong: When encrypting a file, GPG creates a one-off AES encryption key and encrypts that key using RSA. This is supposedly to take advantage of AES's superior performance when handling larger amounts of data. If that's true, then…
Jon Staryuk
  • 223
  • 1
  • 2
  • 5
12
votes
2 answers

How to encrypt data on the server?

I have some data on the server (running Linux) which needs to be encrypted (company policy). This data is being served by an application running on this machine. Now I consider a few possibilities: 1) Encrypt only the partition on which the data…
Janek
  • 223
  • 2
  • 5
12
votes
2 answers

After How Much Data Encryption (AES-256) we should change key?

Considering AES-256 encryption, what is the maximum amount of data should be encrypted with one key? Does Block cipher modes/IV/counters also governs the limit? If say the maximum amount is 50GB, does it mean the one file of 50GB has limit or 5…
Deepesh M
  • 415
  • 1
  • 5
  • 10
11
votes
3 answers

Linux Plausibly Deniable File System

Is there any way to encrypt a Linux filesystem in such a way to maintain plausible deniability? E.g. "Hidden OS support," the way TrueCrypt and Veracrypt work, they only support Windows OS due to low level DISK IO (via filter driver) and support…
grepNstepN
  • 610
  • 4
  • 15
11
votes
5 answers

What does Windows's built-in encryption do, if I can seemingly always read my encrypted files?

I'm playing around with certificates and encryption on a Windows system, but either it isn't working or I don't know how it should works. When I encrypt a file its name changes to green. But then, I can open it without any prompt or something. I…
The Illusive Man
  • 10,487
  • 16
  • 56
  • 88
11
votes
1 answer

Is it possible to decrypt half of a TrueCrypt file container if the other half of the data is missing?

Let's say we have half of a TrueCrypt file container (e.g. download was interrupted). If we know the password, is it possible to open it and get half of the data? The original container has 10 files, so is it possible (in theory) to get 5…
Alex
  • 113
  • 5
11
votes
4 answers

Are MySQL's database files encrypted?

I'm trying to securely store user credentials in a MySQL database which is hosted on a different server than the application (the communication between the two is secure). I have initially assumed that without a knowledge of username/password for…
leopik
  • 233
  • 1
  • 2
  • 5
11
votes
5 answers

How secure are the password files used by Password Safe and Password Gorilla?

Password Safe and Password Gorilla are both programs to manage passwords. Both store a list of user passwords in a file, which is encrypted using a master password. They use the same file format, so you can alternate between the two, using the same…
Nathan Long
  • 2,624
  • 4
  • 21
  • 28
11
votes
12 answers

How can I share files with other individuals using the cloud in a secure way?

I would like to use a dropbox because it is easy and convenient. But I want to encrypt the files with the public key of the intended recipient, so he will be the only one who can access the data in the file. I have not found an easy mechanism to…
1 2
3
31 32