<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/">
  <channel>
    <title>Encryption</title>
    <link>https://www.linuxjournal.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Securing Your Digital Fortress Implementing a Linux Filesystem Encryption With LUKS and eCryptfs</title>
  <link>https://www.linuxjournal.com/content/securing-your-digital-fortress-implementing-linux-filesystem-encryption-luks-and-ecryptfs</link>
  <description>  &lt;div data-history-node-id="1341105" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img loading="lazy" src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/securing-your-digital-fortress-implementing-a-linux-filesystem-encryption-with-luks-and-ecryptfs.jpg" width="850" height="500" alt="Securing Your Digital Fortress Implementing a Linux Filesystem Encryption With LUKS and eCryptfs" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/george-whittaker" lang="" about="https://www.linuxjournal.com/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;George Whittaker&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;In the digital age, data security has become a paramount concern for individuals and organizations alike. With cyber threats evolving at an alarming rate, protecting sensitive information is not just a priority but a necessity. Linux, known for its robust security features, offers powerful tools for filesystem encryption: LUKS (Linux Unified Key Setup) and eCryptfs. These tools provide layers of security for data at rest, ensuring that confidential information remains confidential, even if it falls into the wrong hands. This article embarks on an exploration of LUKS and eCryptfs, shedding light on their mechanisms, benefits, and practical applications.&lt;/p&gt;

&lt;h2&gt;The Foundation of Filesystem Encryption&lt;/h2&gt;

&lt;p&gt;Filesystem encryption is a method of encrypting all files on a filesystem to protect data from unauthorized access. It involves converting data into a coded format that can only be accessed or decrypted with the correct key or passphrase. This security measure is critical for safeguarding sensitive data, including personal information, financial records, and confidential documents.&lt;/p&gt;

&lt;p&gt;Encryption can be symmetric, where the same key is used for both encryption and decryption, or asymmetric, involving a pair of keys for encrypting and decrypting data. For filesystem encryption, symmetric encryption is commonly used due to its efficiency in processing large volumes of data.&lt;/p&gt;

&lt;h2&gt;Unlocking the Vault: An Introduction to LUKS&lt;/h2&gt;

&lt;p&gt;LUKS is a standard for Linux hard disk encryption. By providing a uniform and secure method to manage disk encryption keys, LUKS enables users to encrypt entire volumes, making it an ideal solution for securing data on hard drives, SSDs, or removable storage media.&lt;/p&gt;

&lt;span class="h3-replacement"&gt;&lt;strong&gt;Key Features of LUKS&lt;/strong&gt;&lt;/span&gt;

&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Key Management:&lt;/strong&gt; LUKS supports multiple encryption keys, allowing for flexible key management strategies.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Passphrase Security:&lt;/strong&gt; Users can access the encrypted volume through passphrases, with LUKS allowing for multiple passphrases to decrypt a single volume.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Compatibility:&lt;/strong&gt; LUKS is widely supported across Linux distributions, ensuring compatibility and ease of use.&lt;/li&gt;
&lt;/ul&gt;&lt;span class="h3-replacement"&gt;&lt;strong&gt;How LUKS Works&lt;/strong&gt;&lt;/span&gt;

&lt;p&gt;LUKS operates by setting up an encrypted container on a disk volume. When a user wishes to access the data, they must provide the correct passphrase to unlock the container. LUKS encrypts the entire filesystem, including file names, directory structures, and file contents, using a symmetric encryption algorithm.&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/securing-your-digital-fortress-implementing-linux-filesystem-encryption-luks-and-ecryptfs" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 29 Feb 2024 17:00:00 +0000</pubDate>
    <dc:creator>George Whittaker</dc:creator>
    <guid isPermaLink="false">1341105 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>How to Encrypt and Securely Transfer Files with GPG</title>
  <link>https://www.linuxjournal.com/content/how-encrypt-and-securely-transfer-files-gpg</link>
  <description>  &lt;div data-history-node-id="1341053" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img loading="lazy" src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/how-to-encrypt-and-securely-transfer-files-with-gpg.jpg" width="850" height="500" alt="How to Encrypt and Securely Transfer Files with GPG" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/george-whittaker" lang="" about="https://www.linuxjournal.com/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;George Whittaker&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;h2&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;In the digital age, the security of sensitive information is paramount. Encryption is a critical tool in protecting data from unauthorized access. Among encryption tools, GnuPG (GPG) stands out for its robustness and versatility. This article delves into the world of GPG, guiding you through the process of encrypting and securely transferring files.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Understanding GnuPG (GPG)&lt;/strong&gt;&lt;/h2&gt;

&lt;span class="h3-replacement"&gt;&lt;strong&gt;What is GnuPG (GPG)?&lt;/strong&gt;&lt;/span&gt;

&lt;p&gt;GnuPG, or GPG, is a free implementation of the OpenPGP standard. It allows you to encrypt and sign your data and communications. It features a versatile key management system and access modules for various public key directories.&lt;/p&gt;

&lt;span class="h3-replacement"&gt;&lt;strong&gt;Key Features and Advantages&lt;/strong&gt;&lt;/span&gt;

&lt;p&gt;GPG provides a secure environment for data communication. Its key features include public-key cryptography, a reliable key management system, and compatibility with other encryption standards. The use of GPG ensures that even if data is intercepted, it remains unreadable to unauthorized parties.&lt;/p&gt;

&lt;span class="h3-replacement"&gt;&lt;strong&gt;Differences from Other Encryption Tools&lt;/strong&gt;&lt;/span&gt;

&lt;p&gt;Unlike proprietary encryption software, GPG is open-source, making it more transparent and trustworthy. It's also versatile, compatible with multiple platforms and encryption standards.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Installing GnuPG&lt;/strong&gt;&lt;/h2&gt;

&lt;span class="h3-replacement"&gt;&lt;strong&gt;For Windows, macOS, and Linux&lt;/strong&gt;&lt;/span&gt;

&lt;p&gt;Installation methods vary by operating system. For Windows, Gpg4win provides a comprehensive suite. On macOS, GPG Suite is a popular choice, and most Linux distributions come with GPG pre-installed or easily installable via package managers.&lt;/p&gt;

&lt;span class="h3-replacement"&gt;&lt;strong&gt;Verifying Installation&lt;/strong&gt;&lt;/span&gt;

&lt;p&gt;Post-installation, it's crucial to verify the installation. This can be done through command-line interfaces on each OS, ensuring that GPG commands are recognized and executable.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Generating a GPG Key Pair&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Generating a key pair is the first step in using GPG. This involves creating a public key, which others use to encrypt data they send to you, and a private key, which you use to decrypt received data.&lt;/p&gt;

&lt;ol&gt;&lt;li&gt;Open the command line interface.&lt;/li&gt;
	&lt;li&gt;Use the command &lt;code&gt;gpg --full-gen-key&lt;/code&gt; to initiate key generation.&lt;/li&gt;
	&lt;li&gt;Follow the prompts to choose the type of key, key size, and validity period.&lt;/li&gt;
	&lt;li&gt;Enter your name and email address for the key.&lt;/li&gt;
	&lt;li&gt;Protect your key with a strong passphrase.&lt;/li&gt;
&lt;/ol&gt;&lt;span class="h3-replacement"&gt;&lt;strong&gt;Understanding Public and Private Keys&lt;/strong&gt;&lt;/span&gt;

&lt;p&gt;The public key can be shared openly, while the private key must be kept secure. The strength of your encryption relies on the security of your private key.&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/how-encrypt-and-securely-transfer-files-gpg" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 05 Dec 2023 17:00:00 +0000</pubDate>
    <dc:creator>George Whittaker</dc:creator>
    <guid isPermaLink="false">1341053 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Pretty Good Privacy (PGP) and Digital Signatures</title>
  <link>https://www.linuxjournal.com/content/pretty-good-privacy-pgp-and-digital-signatures</link>
  <description>  &lt;div data-history-node-id="1340804" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/ankur-kothiwall" lang="" about="https://www.linuxjournal.com/users/ankur-kothiwall" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Ankur Kothiwal&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;If you have sent any plaintext confidential emails to someone (most likely you did), have you ever questioned yourself about the mail being tampered with or read by anyone during transit? If not, you should!&lt;/p&gt;

&lt;p&gt;Any unencrypted email is like a postcard. It can be seen by anyone (crackers/security hackers, corporations, governments, or anyone with the required skills), during its transit.&lt;/p&gt;

&lt;p&gt;In 1991 Phil Zimmermann, a free speech activist, and anti-nuclear pacifist developed &lt;em&gt;&lt;strong&gt;Pretty Good Privacy (PGP)&lt;/strong&gt;&lt;/em&gt;, the first software available to the general public that utilized RSA (a public key cryptosystem, will discuss it later) for email encryption and signing. Zimmermann, after having had a friend post the program on the worldwide Usenet, got prosecuted by the U.S. government; later he was charged by the FBI for illegal weapon export because encryption tools were considered as such (all charges were eventually dropped). Zimmermann later founded PGP Inc., which is now part of Symantec Corporation.&lt;/p&gt;

&lt;p&gt;In 1997 PGP Inc. submitted a standardization proposal to the Internet Engineering Task Force. The standard was called &lt;em&gt;&lt;strong&gt;OpenPGP&lt;/strong&gt;&lt;/em&gt; and was defined in 1998 in the IETF document RFC 2440. The latest version of the OpenPGP standard is described in &lt;a href="https://tools.ietf.org/html/rfc4880"&gt;RFC 4880&lt;/a&gt;, published in 2007.&lt;/p&gt;

&lt;p&gt;Nowadays there are many OpenPGP-compliant products: the most widespread is probably &lt;em&gt;&lt;strong&gt;GnuPG (GNU Privacy Guard, or GPG for short)&lt;/strong&gt;&lt;/em&gt; which has been developed since 1999 by Werner Koch. GnuPG is free, open-source, and available for several platforms. It is a command-line only tool.&lt;/p&gt;

&lt;p&gt;PGP is used for digital signature, encryption (and decrypting obviously, nobody will use software which only encrypts!), compression, &lt;a href="https://tools.ietf.org/html/rfc4880#page-53"&gt;Radix-64 conversion&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In this article, we will explain encryption and digital signatures.&lt;/p&gt;

&lt;p&gt;So what encryption is, how does it work, and how does it benefit us?&lt;/p&gt;

&lt;h2&gt;Encryption (Confidentiality)&lt;/h2&gt;

&lt;p&gt;Encryption is the process of conversion of any information to a ciphertext or an unreadable form. A very simple example of encrypting text is:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Hello this is Knownymous and this is a ciphertext.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Uryyb guvf vf Xabjalzbhf naq guvf vf n pvcuregrkg.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;If you read it carefully, you will notice that every letter of the English alphabet is converted to its next 13th letter in the English alphabet, so 13 is the key here, needed to decrypt it. It was known as Caesar cipher (Yes, the method is named after Julius Caesar).&lt;/p&gt;

&lt;p&gt;Since then there are many encryption techniques (Cryptography) developed like- Diffie–Hellman key exchange (DH), RSA.&lt;/p&gt;

&lt;p&gt;The techniques can be used in two ways:&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/pretty-good-privacy-pgp-and-digital-signatures" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 14 Oct 2020 15:29:57 +0000</pubDate>
    <dc:creator>Ankur Kothiwal</dc:creator>
    <guid isPermaLink="false">1340804 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Understanding Public Key Infrastructure and X.509 Certificates</title>
  <link>https://www.linuxjournal.com/content/understanding-public-key-infrastructure-and-x509-certificates</link>
  <description>  &lt;div data-history-node-id="1340425" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/jeff-woods" lang="" about="https://www.linuxjournal.com/users/jeff-woods" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Jeff Woods&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;An introduction to PKI, TLS and X.509, from the ground up.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
Public Key Infrastructure (PKI) provides a framework of encryption and data
communications standards used to secure communications over public networks.
At the heart of PKI is a trust built among clients, servers and certificate
authorities (CAs). This trust is established and propagated through the
generation, exchange and verification of certificates.
&lt;/p&gt;

&lt;p&gt;
This article focuses on understanding the certificates used to establish
trust between clients and servers. These certificates are the most visible
part of the PKI (especially when things break!), so understanding them will
help to make sense of—and correct—many common errors.
&lt;/p&gt;

&lt;p&gt;
As a brief introduction, imagine you want to connect to your bank to
schedule a bill payment, but you want to ensure that your communication is secure.
"Secure" in this context means not only that the content remains
confidential, but also that the server with which you're communicating actually
belongs to your bank.
&lt;/p&gt;

&lt;p&gt;
Without protecting your information in transit, someone located between you
and your bank could observe the credentials you use to log in to the server,
your account information, or perhaps the parties to which your payments are
being sent. Without being able to confirm the identity of the server, you
might be surprised to learn that you are talking to an impostor (who now has
access to your account information).
&lt;/p&gt;

&lt;p&gt;
Transport layer security (TLS) is a suite of protocols used to negotiate a
secured connection using PKI. TLS builds on the SSL standards of the late
1990s, and using it to secure client to server connections on the internet has
become ubiquitous. Unfortunately, it remains one of the least understood
technologies, with errors (often resulting from an incorrectly configured
website) becoming a regular part of daily life. Because those errors are
inconvenient, users regularly click through them without a second thought.
&lt;/p&gt;

&lt;p&gt;
Understanding the X.509 certificate, which is fully defined in RFC 5280, is
key to making sense of those errors. Unfortunately, these certificates have a
well deserved reputation of being opaque and difficult to manage. With the
multitude of formats used to encode them, this reputation is rightly deserved.
&lt;/p&gt;

&lt;p&gt;
An X.509 certificate is a structured, binary record. This record consists of
several key and value pairs. Keys represent field names, where values may be
simple types (numbers, strings) to more complex structures (lists). The
encoding from the key/value pairs to the structured binary record is done
using a standard known as ASN.1 (Abstract Syntax Notation, One), which is a
platform-agnostic encoding format.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/understanding-public-key-infrastructure-and-x509-certificates" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 21 Jun 2019 12:30:00 +0000</pubDate>
    <dc:creator>Jeff Woods</dc:creator>
    <guid isPermaLink="false">1340425 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Why Smart Cards Are Smart</title>
  <link>https://www.linuxjournal.com/content/why-smart-cards-are-smart</link>
  <description>  &lt;div data-history-node-id="1340643" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;If you use GPG keys, learn about the benefits to storing them on a smart card.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
GPG has been around for a long time and is used to secure everything
from your email to your software. If you want to send an email to
someone and be sure that no one else can read or modify it, GPG
signing and encryption are the main method you'd use. Distributions use
GPG to sign their packages, so you can feel confident that the ones you
download and install from a package mirror have not been modified from
their original state. Developers in many organizations follow the best
practice of GPG-signing any code they commit to a repository. By signing
their commits, other people can confirm that the changes that claim to
come from a particular developer truly did. Web-based Git front ends
like GitHub and GitLab let users upload their GPG public keys, so when
they do commit signed code, the interface can display to everyone else
that it has been verified.
&lt;/p&gt;

&lt;p&gt;
Yet, all of the security ultimately comes down to the security of
your private key. Once others have access to your private key, they
can perform all of the same GPG tasks as though they were you. This
is why you are prompted to enter a passphrase when you first set up
a GPG key. The idea is that if attackers are able to copy your key,
they still would need to guess your password before they could use the
key. For all of the importance of GPG key security, many people still
just leave their keys in ~/.gnupg directories on their filesystem and
copy that directory over to any systems where they need to use GPG.
&lt;/p&gt;

&lt;p&gt;
There is a better way. With OpenPGP smart cards, you can store your keys on
a secure device that's protected with a PIN and not only store your keys
more securely, but also use them more conveniently. Although some laptops come
with integrated smart card readers, most don't. Thankfully, these devices
are available as part of multi-function USB security token devices from
a number of different vendors, and &lt;em&gt;Linux Journal&lt;/em&gt; has published reviews of such
products in the past. In this article, I discuss
all the reasons OpenPGP smart cards are a better choice for storing
your keys than your local filesystem.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
Reason 1: Tamper-proof Key Storage&lt;/span&gt;

&lt;p&gt;
One of the main benefits of a smart card is that it stores your GPG keys
securely. When you store your keys on a filesystem, anyone who can access
that filesystem can copy off the keys. On a smart card, once keys go in,
they never leave, neither accidentally nor from tampering. The smart card
chips themselves are designed to be tamper-proof and resist attempts to
extract key data even when someone has physical access. By putting keys
on a smart card, you can have a reasonable assurance that your keys are
safe, even from a determined attacker.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/why-smart-cards-are-smart" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 12 Jun 2019 11:30:00 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1340643 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Disk Encryption for Low-End Hardware</title>
  <link>https://www.linuxjournal.com/content/disk-encryption-low-end-hardware</link>
  <description>  &lt;div data-history-node-id="1340423" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/zack-brown" lang="" about="https://www.linuxjournal.com/users/zack-brown" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Zack Brown&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
&lt;strong&gt;Eric Biggers&lt;/strong&gt; and &lt;strong&gt;Paul Crowley&lt;/strong&gt; were unhappy with the disk encryption
options available for &lt;strong&gt;Android&lt;/strong&gt; on low-end phones and watches. For
them, it was an ethical issue. Eric said:
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;
We believe encryption is
for everyone, not just those who can afford it. And while it's
unknown how long CPUs without AES support will be around, there
will likely always be a "low end"; and in any case, it's immensely
valuable to provide a software-optimized cipher that doesn't depend
on hardware support. Lack of hardware support should not be an
excuse for no encryption.
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;
Unfortunately, they were not able to find any existing encryption
algorithm that was both fast and secure, and that would work with existing
Linux kernel infrastructure. They, therefore, designed the &lt;strong&gt;Adiantum
encryption mode&lt;/strong&gt;, which &lt;a href="https://eprint.iacr.org/2018/720.pdf"&gt;they described in a light, easy-to-read and
completely non-mathematical way&lt;/a&gt;.
&lt;/p&gt;
         
&lt;p&gt;
Essentially, Adiantum is not a new form of encryption; it relies
on the &lt;strong&gt;ChaCha stream cipher&lt;/strong&gt; developed by &lt;strong&gt;D. J. Bernstein&lt;/strong&gt; in 2008.
As Eric put it, "Adiantum is a construction, not a primitive. Its
security is reducible to that of XChaCha12 and AES-256, subject to
a security bound; the proof is in Section 5 of our paper. Therefore,
one need not 'trust' Adiantum; they only need trust XChaCha12 and
AES-256."
&lt;/p&gt;

&lt;p&gt;
Eric reported that Adiantum offered a 20% speed improvement over
his and Paul's earlier &lt;strong&gt;HPolyC encryption mode&lt;/strong&gt;, and it offered a very
slight improvement in actual security.
&lt;/p&gt;

&lt;p&gt;
Eric posted some patches, adding Adiantum to the Linux kernel's
crypto API. He remarked, "Some of these patches conflict with the
new 'Zinc' crypto library. But I don't know when Zinc will be
merged, so for now, I've continued to base this patchset on the
current 'cryptodev'."
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Jason A. Donenfeld&lt;/strong&gt;'s &lt;strong&gt;Zinc&lt;/strong&gt; ("Zinc Is Not crypto/") is a front-runner
to replace the existing kernel crypto API, and it's more simple and
low-level than that API, offering a less terrifying coding experience.
&lt;/p&gt;

&lt;p&gt;
Jason replied to Eric's initial announcement. He was very happy to
see such a good disk encryption alternative for low-end hardware,
but he asked Eric and Paul to hold off on trying to merge their
patches until they could rework them to use the new Zinc security
infrastructure. He said, "In fact, if you already want to build it
on top of Zinc, I'm happy to work with you on that in a shared repo
or similar."
&lt;/p&gt;

&lt;p&gt;
He also suggested that Eric and Paul send their paper through various
academic circles to catch any unanticipated problems with their
encryption system.
&lt;/p&gt;

&lt;p&gt;
But Paul replied:
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/disk-encryption-low-end-hardware" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 07 Feb 2019 13:15:15 +0000</pubDate>
    <dc:creator>Zack Brown</dc:creator>
    <guid isPermaLink="false">1340423 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>At Rest Encryption</title>
  <link>https://www.linuxjournal.com/content/rest-encryption</link>
  <description>  &lt;div data-history-node-id="1339929" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;Learn why at rest encryption doesn't mean encryption when your laptop
is asleep.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
There are many steps you can take to harden a computer, and a common
recommendation you'll see in hardening guides is to enable disk encryption.
Disk encryption also often is referred to as "at rest encryption", especially
in security compliance guides, and many compliance regimes, such as PCI, mandate
the use of at rest encryption. This term refers to the fact that data is
encrypted "at rest" or when the disk is unmounted and not in use. At rest
encryption can be an important part of system-hardening, yet many
administrators who enable it, whether on workstations or servers, may end up
with a false sense of security if they don't understand not only what disk
encryption protects you from, but also, and more important, what it doesn't.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
What Disk Encryption Does&lt;/span&gt;

&lt;p&gt;
In the context of Linux servers and workstations, disk encryption generally
means you are using a system such as LUKS to encrypt either the entire root
partition or only a particularly sensitive mountpoint. For instance, some
Linux distributions offer the option of leaving the root partition
unencrypted, and they encrypt each user's /home directories independently, to
be unlocked when the user logs in. In the case of servers, you might leave
root unencrypted and add encryption only to specific disks that contain
sensitive data (like database files).
&lt;/p&gt;

&lt;p&gt;
In a workstation, you notice when a system is encrypted at rest because it
will prompt you for a passphrase to unlock the disk at boot time. Servers
typically are a bit trickier, because usually administrators prefer that a server
come back up after a reboot without manual intervention. Although some servers
may provide a console-based prompt to unlock the disk at boot time,
administrators are more likely to have configured LUKS so that the key resides
on a separate unencrypted partition. Or, the server may retrieve the
key from the network using their configuration management or a centralized
secrets management tool like Vault, so there is less of a risk of the key
being stolen by an attacker with access to the filesystem.
&lt;/p&gt;

&lt;p&gt;
The main thing that at rest encryption protects you from is data loss due to
theft or improper decommissioning of hard drives. If someone steals your
laptop while it's powered off, your data will be protected. If someone goes
into a data center and physically removes drives from a server with at rest
encryption in place, the drives will spin down, and the data on them will be
encrypted. The same goes for disks in a server that has been retired.
Administrators are supposed to perform secure wiping or full disk destruction
procedures to remove sensitive data from drives before disposal, but if
the administrator was lazy, disk encryption can help ensure that the data is still
protected if it gets into the wrong hands.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/rest-encryption" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 18 Jul 2018 11:45:00 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1339929 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>The Wire</title>
  <link>https://www.linuxjournal.com/content/wire</link>
  <description>  &lt;div data-history-node-id="1339534" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/shawn-powers" lang="" about="https://www.linuxjournal.com/users/shawn-powers" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Shawn Powers&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
In the US, there has been recent concern over ISPs turning over logs to
the government. During the past few years, the idea of people snooping on
our private data (by governments and others) really has made encryption
more popular than ever before. One of the problems with encryption,
however, is that it's generally not user-friendly to add its protection
to your conversations. Thankfully, messaging services are starting
to take notice of the demand. For me, I need a messaging service that
works across multiple platforms, encrypts automatically, supports group
messaging and ideally can handle audio/video as well. Thankfully,
I found an incredible open-source package that ticks all my boxes: Wire.
&lt;/p&gt;
&lt;img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/12188wiref1.png" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;p&gt;
There are some other great software packages for encrypting
conversations. Programs like Signal do end-to-end encryption, but
fall short when it comes to audio and video. Telegram is great
for sending encrypted file transfers, but it doesn't handle direct
communication. Thankfully, Wire not only encrypts text, video, audio
and media, but it also does end-to-end encrypted group interactions. Plus,
it has clients for just about any platform imaginable.
&lt;/p&gt;
&lt;img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/12188wiref2.png" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;p&gt;
Users have a user name that is identified much like a Twitter handle. My
account, for instance, is @shawnp0wers. And since Wire is open source,
there aren't any targeted ads, popups or banners. It's just encrypted
communication done in a convenient way.
Check it out today at &lt;a href="http://wire.com"&gt;http://wire.com&lt;/a&gt;.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/wire" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 30 Oct 2017 12:09:27 +0000</pubDate>
    <dc:creator>Shawn Powers</dc:creator>
    <guid isPermaLink="false">1339534 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Jetico's BestCrypt Container Encryption for Linux</title>
  <link>https://www.linuxjournal.com/content/jeticos-bestcrypt-container-encryption-linux-0</link>
  <description>  &lt;div data-history-node-id="1339416" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/james-gray" lang="" about="https://www.linuxjournal.com/users/james-gray" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;James Gray&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Cyber-attacks are now constant, threats to privacy are increasing, and more rigid
regulations are looming worldwide. To help IT folks relax in the face of these
challenges, &lt;a href="http://jetico.com"&gt;Jetico&lt;/a&gt; updated its BestCrypt Container Encryption solution to include
Container Guard. 
&lt;/p&gt;

&lt;p&gt;
This unique feature of Jetico's Linux file encryption
protects container files from unauthorized or accidental commands—like copying,
modification, moving, deletion and re-encryption—resulting in bolstered
security and more peace of mind. Only users with the admin password can disable
Container Guard, increasing the security of sensitive files. 
&lt;/p&gt;
&lt;img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/12187f1.png" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;p&gt;
The BestCrypt update
also adds the Resident feature, an automatic password prompt for mounting
containers at startup. That same feature will dismount containers after a time
period of inactivity as set by the user. 
&lt;/p&gt;

&lt;p&gt;
While user-friendly and time-saving,
these added features also provide an extra layer of protection when working on
shared computers. On endpoints or in the cloud, data encrypted with BestCrypt can
be accessed via Linux, Android, Windows and Mac devices.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/jeticos-bestcrypt-container-encryption-linux-0" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 16 Jun 2017 16:22:09 +0000</pubDate>
    <dc:creator>James Gray</dc:creator>
    <guid isPermaLink="false">1339416 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Flat File Encryption with OpenSSL and GPG</title>
  <link>https://www.linuxjournal.com/content/flat-file-encryption-openssl-and-gpg</link>
  <description>  &lt;div data-history-node-id="1339346" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/charles-fisher" lang="" about="https://www.linuxjournal.com/users/charles-fisher" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Charles Fisher&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
The Pretty Good Privacy (PGP) application, which has long been known as a
primary tool for file encryption, commonly focused on email. It has
management tools for exchanging credentials with peers and creating secure
communication channels over untrusted networks. GNU Privacy Guard (GPG) has
carried on this legacy with a free and open implementation included in most
major Linux distributions. PGP/GPG has proven highly resistant to
cryptographic attack and is a preeminent tool for secure communications.
&lt;/p&gt;

&lt;p&gt;
OpenSSL is more known for network security, but it also has tools useful
for most aspects of encrypting flat files. Although using OpenSSL requires
more knowledge of specific algorithms and methods, it can be more flexible
in a number of scenarios than other approaches. OpenSSH keys
can be used transparently for flat file encryption with OpenSSL, allowing
user and/or host SSH keys to pervade any number of unrelated services.
&lt;/p&gt;

&lt;p&gt;
OpenSSL is also useful for illustrating the sequence of encryption
techniques that create secure channels. This knowledge is applicable in
many other situations, so the material is worth study even if there is no
immediate need for the tools.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
OpenSSL Flat File Processing&lt;/span&gt;

&lt;p&gt;
Many common programs in UNIX have implementations within the OpenSSL
command-line utility. These include digest/checksum tools (md5sum, sha1sum,
sha256sum), "ASCII-Armor" tools (base64/uuencode/uudecode),
"safe" random
number generation and MIME functions in addition to a suite of cipher and
key management utilities. Because OpenSSL often is found on non-UNIX
platforms, those utilities can provide a familiar interface on unfamiliar
systems for UNIX administrators.
&lt;/p&gt;

&lt;p&gt;
Let's begin with a complete script for flat file encryption with OpenSSL,
using asymmetric exchange of a session key, SHA-256 digest checksums and
the use of a symmetric cipher. This entire exchange, both to encode and
decode, is presented in the following text for the Korn shell (GNU Bash
also may
be used with no required changes):

&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/flat-file-encryption-openssl-and-gpg" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 04 Apr 2017 09:46:42 +0000</pubDate>
    <dc:creator>Charles Fisher</dc:creator>
    <guid isPermaLink="false">1339346 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
