Difference between revisions of "Ccrypt"
(Created page with "{{Entry |Name=ccrypt |Short description=Encryption utility |Full description='ccrypt' is a utility for encrypting and decrypting files and streams. It was designed to replace the...") |
(New version) |
||
Line 3: | Line 3: | ||
|Short description=Encryption utility | |Short description=Encryption utility | ||
|Full description='ccrypt' is a utility for encrypting and decrypting files and streams. It was designed to replace the standard Unix 'crypt' utility, which is notorious for using a very weak encryption algorithm. 'ccrypt' is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. Unlike unix crypt, the algorithm provided by ccrypt is not symmetric (one must specify whether to encrypt or decrypt). Encryption and decryption depend on a user-supplied keyword (key phrase). Keywords can be any number of characters; all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security, since they are less likely to be discovered by exhaustive search. | |Full description='ccrypt' is a utility for encrypting and decrypting files and streams. It was designed to replace the standard Unix 'crypt' utility, which is notorious for using a very weak encryption algorithm. 'ccrypt' is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. Unlike unix crypt, the algorithm provided by ccrypt is not symmetric (one must specify whether to encrypt or decrypt). Encryption and decryption depend on a user-supplied keyword (key phrase). Keywords can be any number of characters; all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security, since they are less likely to be discovered by exhaustive search. | ||
+ | |Homepage URL=http://ccrypt.sourceforge.net/ | ||
|User level=none | |User level=none | ||
− | |||
− | |||
− | |||
− | |||
|Computer languages=C | |Computer languages=C | ||
− | |||
− | |||
− | |||
− | |||
− | |||
|Related projects=Aesutil | |Related projects=Aesutil | ||
|Keywords=cryptography,encryption,AES,crypt,decryption,ccrypt,Rijndael,Advanced Encrytion Stand | |Keywords=cryptography,encryption,AES,crypt,decryption,ccrypt,Rijndael,Advanced Encrytion Stand | ||
− | | | + | |Version identifier=1.10 |
− | |Last review by= | + | |Version date=2012/10/18 |
− | |Last review date= | + | |Version status=stable |
+ | |Version download=http://ccrypt.sourceforge.net/download/ccrypt-1.10.tar.gz | ||
+ | |Version comment=1.10 stable released 2012-10-18 | ||
+ | |Last review by=Alejandroindependiente | ||
+ | |Last review date=2017/02/24 | ||
|Submitted by=Database conversion | |Submitted by=Database conversion | ||
|Submitted date=2011-04-01 | |Submitted date=2011-04-01 | ||
− | | | + | |Status= |
− | | | + | |Is GNU=No |
− | | | + | |License verified date=2001-11-28 |
− | | | + | }} |
+ | {{Project license | ||
+ | |License=GPLv2orlater | ||
+ | |License verified by=Janet Casey | ||
|License verified date=2001-11-28 | |License verified date=2001-11-28 | ||
− | |||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=Peter Selinger | ||
|Role=Maintainer | |Role=Maintainer | ||
− | |||
|Email=selinger@users.sourceforge.net | |Email=selinger@users.sourceforge.net | ||
|Resource URL= | |Resource URL= | ||
Line 44: | Line 42: | ||
|Use=security | |Use=security | ||
}} | }} | ||
− | {{ | + | {{Featured}} |
− | |||
− | |||
− | |||
− | }} |
Revision as of 14:18, 24 February 2017
ccrypt
http://ccrypt.sourceforge.net/
Encryption utility
'ccrypt' is a utility for encrypting and decrypting files and streams. It was designed to replace the standard Unix 'crypt' utility, which is notorious for using a very weak encryption algorithm. 'ccrypt' is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. Unlike unix crypt, the algorithm provided by ccrypt is not symmetric (one must specify whether to encrypt or decrypt). Encryption and decryption depend on a user-supplied keyword (key phrase). Keywords can be any number of characters; all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security, since they are less likely to be discovered by exhaustive search.
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Peter Selinger | Maintainer |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Bug Tracking,Developer,Support | mailto:selinger@users.sourceforge.net | |
Python (Ref) | https://pypi.org/project/ccrypt | |
Debian (Ref) | https://tracker.debian.org/pkg/ccrypt |
Software prerequisites
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.