Ubuntu Manpage: scrypt — encrypt and decrypt files. (2024)

Provided by: scrypt_1.3.1-2ubuntu1_amd64 Ubuntu Manpage: scrypt — encrypt and decrypt files. (1)

NAME

 scrypt — encrypt and decrypt files.

SYNOPSIS

 scrypt {enc | dec | info} [-f] [--logN value] [-M maxmem] [-m maxmemfrac] [-P] [-p value] [--passphrase method:arg] [-r value] [-t maxtime] [-v] infile [outfile] scrypt --version

DESCRIPTION

 scrypt enc encrypts infile and writes the result to outfile if specified, or the standard output otherwise. The user will be prompted to enter a passphrase (twice) to be used to generate a derived encryption key. scrypt dec decrypts infile and writes the result to outfile if specified, or the standard output otherwise. The user will be prompted to enter the passphrase used at encryption time to generate the derived encryption key. scrypt info provides information about the encryption parameters used for infile. If -P is not given, scrypt reads passphrases from its controlling terminal, or failing that, from stdin. Prompts are only printed when scrypt is reading passphrases from some terminal. If -P is given, then scrypt does not print any prompts, and reads a passphrase from stdin.

OPTIONS

 -f Force the decryption to proceed even if it is anticipated to require an excessive amount of memory or CPU time. --logN value Set the work parameter N to 2^value. If --logN is set, -r and -p must also be set. If such explicit parameters are given, the resource limits set by -M, -m, and -t are not enforced. -M maxmem Use at most maxmem bytes of RAM to compute the derived encryption key. -m maxmemfrac Use at most the fraction maxmemfrac of the available RAM to compute the derived encryption key. -P Always read passphrase from stdin, and do so only once even when encrypting. This cannot be used if infile is also stdin (aka '-'). -p value Set the work parameter p to value. If -p is set, --logN and -r must also be set. If such explicit parameters are given, the resource limits set by -M, -m, and -t are not enforced. --passphrase method:arg Read the passphrase using the specified method. dev:tty-stdin Attempt to read the passphrase from /dev/tty; if that fails, read it from stdin. This is the default behaviour. dev:stdin-once Attempt to read the passphrase from stdin, and do so only once even when encrypting. This cannot be used if infile is also stdin (aka '-'). dev:tty-once Attempt to read the passphrase from /dev/tty, and do so only once even when encrypting. env:VAR Read the passphrase from the environment variable specified by VAR. Storing a passphrase in an environment variable may be a security risk. Only use this option if you are certain that you know what you are doing. file:FILENAME Read the passphrase from the file specified by FILENAME. Storing a passphrase in a file may be a security risk. Only use this option if you are certain that you know what you are doing. -r value Set the work parameter r to value. If -r is set, --logN and -p must also be set. If such explicit parameters are given, the resource limits set by -M, -m, and -t are not enforced. -t maxtime Use at most maxtime seconds of CPU time to compute the derived encryption key. --v Print encryption parameters (N, r, p) and memory/cpu limits. --version Print version of scrypt, and exit. In scrypt enc, the memory and CPU time limits are enforced by picking appropriate parameters to the scrypt key derivation function. In scrypt dec, the memory and CPU time limits are enforced by exiting with an error if decrypting the file would require too much memory or CPU time.

EXIT STATUS

 The scrypt utility exits 0 on success, and >0 if an error occurs. Note that if the input encrypted file is corrupted, scrypt dec may produce output prior to determining that the input was corrupt and exiting with a non-zero status; so users should direct the output to a safe location and check the exit status of scrypt before using the decrypted data.

ALGORITHM PARAMETERS

 The scrypt algorithm has three tuneable work parameters: N, r, p. When decrypting, scrypt will always use the values specified by the encryption header. When encrypting, scrypt will choose appropriate values based on your system's speed and memory (influenced by -M, -m, and/or -t), unless you specify explicit parameters via --logN, -p, -r.

SEE ALSO

 Colin Percival, Stronger Key Derivation via Sequential Memory-Hard Functions, BSDCan'09, May 2009. Colin Percival and Simon Josefsson, The scrypt Password-Based Key Derivation Function, IETF RFC 7914, August 2016.

HISTORY

 The scrypt utility was written in May 2009 by Colin Percival as a demonstration of the scrypt key derivation function. The scrypt key derivation function was invented in March 2009 by Colin Percival in order to allow key files from the Tarsnap backup system to be passphrase protected.
Ubuntu Manpage:

     scrypt — encrypt and decrypt files. (2024)

FAQs

What is the command mostly commonly used to encrypt files in Linux? ›

When all you want is to encrypt a file or two, all you need is one of the crypt commands – bcrypt [1], ccrypt [2], or mcrypt [3]. All three are specialized for encrypting files and can even have a feature or two that are missing from the better known encryption applications.

What are different steps to encrypt and decrypt files in Linux? ›

Use the appropriate commands (gpg --encrypt or right-click and select Encrypt) to encrypt the files in linux, and check for the ". gpg" or ". pgp" extension on the encrypted files. When decrypting files, provide the correct passphrase or key to successfully access the original content.

Can someone crack AES 256? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities. However, no encryption standard or system is completely secure.

How long does it take to crack AES 256? ›

With the right quantum computer, AES-128 would take about 2.61*10^12 years to crack, while AES-256 would take 2.29*10^32 years. For reference, the universe is currently about 1.38×10^10 years old, so cracking AES-128 with a quantum computer would take about 200 times longer than the universe has existed.

How to check if a file is AES encrypted? ›

You look at the entropy of the file. If the entropy is high, then it's likely encrypted. You can use tools like binwalk to determine the entropy.

How to decrypt a file using cipher command? ›

Decrypting Files Using the Command Line

1. Enter the directory/folder in question using the cd command. 2. Type cipher /d once you're within the directory to decrypt all files inside of it.

What is the most secure filesystem in Linux? ›

A general rule of thumb is to use XFS for servers storing large data files and ext4 for better directory security.

What are the encryption algorithms in Linux? ›

Popular symmetric encryption algorithms in Linux include Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Triple DES (3DES). Asymmetric encryption, or public-key encryption, utilizes a pair of keys: a public key for encryption and a private key for decryption.

Which Linux command is used to create an encrypted password? ›

You can generate this encrypted password with the openssl passwd command. The openssl passwd command will generate several distinct hashes for the same password, for this it uses a salt. This salt can be chosen and is visible as the first two characters of the hash.

Are Ubuntu files encrypted? ›

Ubuntu Core uses full disk encryption (FDE) whenever the hardware allows, protecting both the confidentiality and integrity of a device's data when there's physical access to a device, or after a device has been lost or stolen.

How to encrypt disk Ubuntu after install? ›

Unfortunately, the only way to activate full disk encryption is to reinstall Ubuntu Linux. If you have previously installed it, you can only encrypt and mount specific partitions. Enabling full disk encryption from the start is essential, as it protects all areas, including the boot partition and swap space.

How to decrypt the encrypted password in Linux? ›

Enter the command ./decrypt_string.sh <encrypted_password> . For <encrypted_password> , use the text that you copied in Step 4. You are prompted for the system passphrase. After you enter the passphrase, your decrypted password appears.

Top Articles
Shadow
How to Mine Tether (USDT) - Bitnovo Blog
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6460

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.