O'Reilly logo

Linux Shell Scripting Cookbook by Sarath Lakshman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cryptographic tools and hashes

Encryption techniques are used mainly to protect data from unauthorized access. There are many algorithms available and we use a common set of standard algorithms. There are a few tools available in a Linux environment for performing encryption and decryption. Sometimes we use encryption algorithm hashes for verifying data integrity. This section will introduce a few commonly-used cryptographic tools and a general set of algorithms that these tools can handle.

How to do it...

Let's see how to use the tools such as crypt, gpg, base64, md5sum, sha1sum, and openssl:

  • crypt

    The crypt command is a simple cryptographic utility, which takes a file from stdin and a passphrase as input and outputs encrypted data into stdout ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required