Cryptography
Description
Cryptography can be used to ensure the confidentiality, integrity and authenticity of information, either at rest or in transit. Common uses of cryptography on computer systems are to encrypt:
- individual files (for example using GPG or one of the successors to the original UNIX
crypt
command); - complete filesystems (for example using dm-crypt or Truecrypt);
- network connections (for example using SSL/TLS to protect HTTP web page transfers); and
- passwords (for example in a shadow password file, or as part of a single sign-on authentication system such as Kerberos).
microHOWTOs
- Configure Subversion to trust a given SSL certificate
- Create a fresh self-signed SSL certificate for uw-imapd
- Create a self-signed SSL certificate
- Create an encrypted swap area
- Remove the passphrase from an existing OpenSSL key file
Further reading
- The GNU Privacy Guard (official website)
- dm-crypt: a device-mapper crypto target (official website)
- cryptmount - a utility for accessing encrypted filesystems (official website)
- TrueCrypt (official website)
- Kerberos: The Network Authentication Protocol (official website for MIT Kerberos)