Home Operation and Maintenance Linux Operation and Maintenance How to Encrypt and Decrypt Data in Linux

How to Encrypt and Decrypt Data in Linux

Jun 19, 2023 am 08:35 AM
encryption decryption linux encryption

As data privacy and security become increasingly important, data encryption and decryption have become essential technologies. There are multiple ways to encrypt and decrypt data in the Linux operating system. This article will introduce several common methods.

  1. Encryption and decryption using OpenSSL

OpenSSL is a popular encryption library that supports multiple algorithms, including AES, DES, RSA, and more. In Linux systems, you can use OpenSSL commands for encryption and decryption operations.

Encrypt data:

openssl enc -e -aes256 -in plaintext.txt -out encrypted.txt
Copy after login

In the above command, the -e parameter indicates encryption, -aes256 indicates the use of the AES encryption algorithm, the -in parameter specifies the input file, and the -out parameter specifies the output file. . After running the above command, you will be prompted for the encryption password.

Decrypt the encrypted data:

openssl enc -d -aes256 -in encrypted.txt -out decrypted.txt
Copy after login

The decryption operation is similar to the encryption operation, just change the -e parameter to -d.

  1. Use GnuPG for encryption and decryption

GnuPG is a free encryption software that uses the OpenPGP standard for encryption and decryption operations. In Linux systems, GnuPG has been integrated in most distributions, and users can use it through the command line or graphical user interface.

Encrypt data:

gpg -e -o output.gpg -r recipient@example.com file.txt
Copy after login

In the above command, the -e parameter indicates the encryption operation, the -o parameter specifies the output encrypted file name, and the -r parameter specifies the email address of the recipient. , file.txt is the input file. After running the above command, you will be prompted for your password.

Decrypt the encrypted data:

gpg -d -o output.txt input.gpg
Copy after login

In the above command, the -d parameter indicates the decryption operation, the -o parameter specifies the output decrypted file name, and input.gpg is the input Encrypt files. After running the above command, you will be prompted for your password.

  1. Use Cryptsetup for encryption and decryption

Cryptsetup is an encryption software in Linux systems that supports multiple encryption algorithms, including AES, Twofish, etc. Cryptsetup can encrypt at the hard drive, partition and even file level.

Encrypt data:

cryptsetup luksFormat /dev/sdb1
cryptsetup luksOpen /dev/sdb1 mydata
mkfs.ext4 /dev/mapper/mydata
Copy after login

Among the above commands, the first command will format and encrypt the /dev/sdb1 device, and the second command will map the encrypted device For mydata, the third command formats mydata into an ext4 file system. During formatting, you will be prompted for a password.

Decrypt the encrypted data:

cryptsetup luksOpen /dev/sdb1 mydata
mount /dev/mapper/mydata /mnt
Copy after login

Among the above commands, the first command maps the encrypted device /dev/sdb1 to mydata, and the second command hangs mydata Load to the /mnt directory. When mounting, you will be prompted for a password.

Summary

The above are three common methods for data encryption and decryption in Linux systems. These methods can be flexibly combined in practical applications, such as using OpenSSL to encrypt data and then using Cryptsetup to encrypt the hard disk. In any case, choosing an encryption algorithm that suits your needs and setting strong passwords is key to keeping your data safe.

The above is the detailed content of How to Encrypt and Decrypt Data in Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do I use regular expressions (regex) in Linux for pattern matching? How do I use regular expressions (regex) in Linux for pattern matching? Mar 17, 2025 pm 05:25 PM

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

How do I monitor system performance in Linux using tools like top, htop, and vmstat? How do I monitor system performance in Linux using tools like top, htop, and vmstat? Mar 17, 2025 pm 05:28 PM

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

How do I implement two-factor authentication (2FA) for SSH in Linux? How do I implement two-factor authentication (2FA) for SSH in Linux? Mar 17, 2025 pm 05:31 PM

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

How do I manage software packages in Linux using package managers (apt, yum, dnf)? How do I manage software packages in Linux using package managers (apt, yum, dnf)? Mar 17, 2025 pm 05:26 PM

Article discusses managing software packages in Linux using apt, yum, and dnf, covering installation, updates, and removals. It compares their functionalities and suitability for different distributions.

How do I use sudo to grant elevated privileges to users in Linux? How do I use sudo to grant elevated privileges to users in Linux? Mar 17, 2025 pm 05:32 PM

The article explains how to manage sudo privileges in Linux, including granting, revoking, and best practices for security. Key focus is on editing /etc/sudoers safely and limiting access.Character count: 159

How do I build and customize a Linux distribution? How do I build and customize a Linux distribution? Mar 14, 2025 pm 04:45 PM

The article details the process of building and customizing a Linux distribution, covering choosing a base system, using build tools like LFS and Debian-based systems, customizing packages, and modifying the kernel. It also discusses managing softwar

How do I configure networking in Linux (static IP, DHCP, DNS)? How do I configure networking in Linux (static IP, DHCP, DNS)? Mar 14, 2025 pm 04:55 PM

The article provides a guide on configuring Linux networking, focusing on setting up static IP, DHCP, and DNS configurations. It details steps for editing configuration files and restarting network services to apply changes.

What are the most popular Linux distributions (Ubuntu, Debian, Fedora, CentOS)? What are the most popular Linux distributions (Ubuntu, Debian, Fedora, CentOS)? Mar 14, 2025 pm 04:50 PM

The article discusses popular Linux distributions: Ubuntu, Debian, Fedora, and CentOS, focusing on their unique features and suitability for different users. It compares Ubuntu and Debian's release cycles, software availability, and support, and high

See all articles