Ubuntu Manpage: scrypt — encrypt and decrypt files. (2024)

Provided by: scrypt_1.3.1-2ubuntu1_amd64 Ubuntu Manpage: scrypt — encrypt and decrypt files. (1)

NAME

 scrypt — encrypt and decrypt files.

SYNOPSIS

 scrypt {enc | dec | info} [-f] [--logN value] [-M maxmem] [-m maxmemfrac] [-P] [-p value] [--passphrase method:arg] [-r value] [-t maxtime] [-v] infile [outfile] scrypt --version

DESCRIPTION

 scrypt enc encrypts infile and writes the result to outfile if specified, or the standard output otherwise. The user will be prompted to enter a passphrase (twice) to be used to generate a derived encryption key. scrypt dec decrypts infile and writes the result to outfile if specified, or the standard output otherwise. The user will be prompted to enter the passphrase used at encryption time to generate the derived encryption key. scrypt info provides information about the encryption parameters used for infile. If -P is not given, scrypt reads passphrases from its controlling terminal, or failing that, from stdin. Prompts are only printed when scrypt is reading passphrases from some terminal. If -P is given, then scrypt does not print any prompts, and reads a passphrase from stdin.

OPTIONS

 -f Force the decryption to proceed even if it is anticipated to require an excessive amount of memory or CPU time. --logN value Set the work parameter N to 2^value. If --logN is set, -r and -p must also be set. If such explicit parameters are given, the resource limits set by -M, -m, and -t are not enforced. -M maxmem Use at most maxmem bytes of RAM to compute the derived encryption key. -m maxmemfrac Use at most the fraction maxmemfrac of the available RAM to compute the derived encryption key. -P Always read passphrase from stdin, and do so only once even when encrypting. This cannot be used if infile is also stdin (aka '-'). -p value Set the work parameter p to value. If -p is set, --logN and -r must also be set. If such explicit parameters are given, the resource limits set by -M, -m, and -t are not enforced. --passphrase method:arg Read the passphrase using the specified method. dev:tty-stdin Attempt to read the passphrase from /dev/tty; if that fails, read it from stdin. This is the default behaviour. dev:stdin-once Attempt to read the passphrase from stdin, and do so only once even when encrypting. This cannot be used if infile is also stdin (aka '-'). dev:tty-once Attempt to read the passphrase from /dev/tty, and do so only once even when encrypting. env:VAR Read the passphrase from the environment variable specified by VAR. Storing a passphrase in an environment variable may be a security risk. Only use this option if you are certain that you know what you are doing. file:FILENAME Read the passphrase from the file specified by FILENAME. Storing a passphrase in a file may be a security risk. Only use this option if you are certain that you know what you are doing. -r value Set the work parameter r to value. If -r is set, --logN and -p must also be set. If such explicit parameters are given, the resource limits set by -M, -m, and -t are not enforced. -t maxtime Use at most maxtime seconds of CPU time to compute the derived encryption key. --v Print encryption parameters (N, r, p) and memory/cpu limits. --version Print version of scrypt, and exit. In scrypt enc, the memory and CPU time limits are enforced by picking appropriate parameters to the scrypt key derivation function. In scrypt dec, the memory and CPU time limits are enforced by exiting with an error if decrypting the file would require too much memory or CPU time.

EXIT STATUS

 The scrypt utility exits 0 on success, and >0 if an error occurs. Note that if the input encrypted file is corrupted, scrypt dec may produce output prior to determining that the input was corrupt and exiting with a non-zero status; so users should direct the output to a safe location and check the exit status of scrypt before using the decrypted data.

ALGORITHM PARAMETERS

 The scrypt algorithm has three tuneable work parameters: N, r, p. When decrypting, scrypt will always use the values specified by the encryption header. When encrypting, scrypt will choose appropriate values based on your system's speed and memory (influenced by -M, -m, and/or -t), unless you specify explicit parameters via --logN, -p, -r.

SEE ALSO

 Colin Percival, Stronger Key Derivation via Sequential Memory-Hard Functions, BSDCan'09, May 2009. Colin Percival and Simon Josefsson, The scrypt Password-Based Key Derivation Function, IETF RFC 7914, August 2016.

HISTORY

 The scrypt utility was written in May 2009 by Colin Percival as a demonstration of the scrypt key derivation function. The scrypt key derivation function was invented in March 2009 by Colin Percival in order to allow key files from the Tarsnap backup system to be passphrase protected.
Ubuntu Manpage:

     scrypt — encrypt and decrypt files. (2024)

FAQs

What is the command mostly commonly used to encrypt files in Linux? ›

When all you want is to encrypt a file or two, all you need is one of the crypt commands – bcrypt [1], ccrypt [2], or mcrypt [3]. All three are specialized for encrypting files and can even have a feature or two that are missing from the better known encryption applications.

What are different steps to encrypt and decrypt files in Linux? ›

Use the appropriate commands (gpg --encrypt or right-click and select Encrypt) to encrypt the files in linux, and check for the ". gpg" or ". pgp" extension on the encrypted files. When decrypting files, provide the correct passphrase or key to successfully access the original content.

Can someone crack AES 256? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities. However, no encryption standard or system is completely secure.

How long does it take to crack AES 256? ›

With the right quantum computer, AES-128 would take about 2.61*10^12 years to crack, while AES-256 would take 2.29*10^32 years. For reference, the universe is currently about 1.38×10^10 years old, so cracking AES-128 with a quantum computer would take about 200 times longer than the universe has existed.

How to check if a file is AES encrypted? ›

You look at the entropy of the file. If the entropy is high, then it's likely encrypted. You can use tools like binwalk to determine the entropy.

How to decrypt a file using cipher command? ›

Decrypting Files Using the Command Line

1. Enter the directory/folder in question using the cd command. 2. Type cipher /d once you're within the directory to decrypt all files inside of it.

What is the most secure filesystem in Linux? ›

A general rule of thumb is to use XFS for servers storing large data files and ext4 for better directory security.

What are the encryption algorithms in Linux? ›

Popular symmetric encryption algorithms in Linux include Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Triple DES (3DES). Asymmetric encryption, or public-key encryption, utilizes a pair of keys: a public key for encryption and a private key for decryption.

Which Linux command is used to create an encrypted password? ›

You can generate this encrypted password with the openssl passwd command. The openssl passwd command will generate several distinct hashes for the same password, for this it uses a salt. This salt can be chosen and is visible as the first two characters of the hash.

Are Ubuntu files encrypted? ›

Ubuntu Core uses full disk encryption (FDE) whenever the hardware allows, protecting both the confidentiality and integrity of a device's data when there's physical access to a device, or after a device has been lost or stolen.

How to encrypt disk Ubuntu after install? ›

Unfortunately, the only way to activate full disk encryption is to reinstall Ubuntu Linux. If you have previously installed it, you can only encrypt and mount specific partitions. Enabling full disk encryption from the start is essential, as it protects all areas, including the boot partition and swap space.

How to decrypt the encrypted password in Linux? ›

Enter the command ./decrypt_string.sh <encrypted_password> . For <encrypted_password> , use the text that you copied in Step 4. You are prompted for the system passphrase. After you enter the passphrase, your decrypted password appears.

Top Articles
How to Increase Prices on Amazon | Goat Consulting
Complimenting Grey: The Best Accent Wall Colours To Pair With Grey - Nerolac
Tattoo Shops Lansing Il
Foxy Roxxie Coomer
Coffman Memorial Union | U of M Bookstores
Craigslist In Fredericksburg
Jesus Revolution Showtimes Near Chisholm Trail 8
Revitalising marine ecosystems: D-Shape’s innovative 3D-printed reef restoration solution - StartmeupHK
Oriellys St James Mn
Hmr Properties
Wordle auf Deutsch - Wordle mit Deutschen Wörtern Spielen
Chic Lash Boutique Highland Village
Chastity Brainwash
Log in or sign up to view
Powerball winning numbers for Saturday, Sept. 14. Check tickets for $152 million drawing
Nhl Wikia
Abby's Caribbean Cafe
Costco Great Oaks Gas Price
Conan Exiles Sorcery Guide – How To Learn, Cast & Unlock Spells
Egizi Funeral Home Turnersville Nj
Cain Toyota Vehicles
Delectable Birthday Dyes
Ultra Ball Pixelmon
Obituaries, 2001 | El Paso County, TXGenWeb
The Procurement Acronyms And Abbreviations That You Need To Know Short Forms Used In Procurement
2021 Tesla Model 3 Standard Range Pl electric for sale - Portland, OR - craigslist
How Do Netspend Cards Work?
Sam's Club Near Wisconsin Dells
Ghid depunere declarație unică
John F Slater Funeral Home Brentwood
Go Upstate Mugshots Gaffney Sc
Tal 3L Zeus Replacement Lid
What Does Code 898 Mean On Irs Transcript
Barber Gym Quantico Hours
Mixer grinder buying guide: Everything you need to know before choosing between a traditional and bullet mixer grinder
Wlds Obits
Bartow Qpublic
Sofia With An F Mugshot
Mychart Mercy Health Paducah
How I Passed the AZ-900 Microsoft Azure Fundamentals Exam
Meet Robert Oppenheimer, the destroyer of worlds
Lebron James Name Soundalikes
Dietary Extras Given Crossword Clue
Makemkv Key April 2023
Runescape Death Guard
Call2Recycle Sites At The Home Depot
Dmv Kiosk Bakersfield
Ics 400 Test Answers 2022
Philasd Zimbra
Factorio Green Circuit Setup
Mast Greenhouse Windsor Mo
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6460

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.