{"id":64,"date":"2012-08-13T13:45:12","date_gmt":"2012-08-13T17:45:12","guid":{"rendered":"https:\/\/infotechguy.net\/?p=64"},"modified":"2025-02-22T13:15:56","modified_gmt":"2025-02-22T18:15:56","slug":"file-encryption-with-ccrypt-axcrypt","status":"publish","type":"post","link":"https:\/\/infotechguy.net\/?p=64","title":{"rendered":"Linux &#8212; Encrypt files with CCrypt, AxCrypt, and OpenSSL"},"content":{"rendered":"<p>Are you someone who keeps a text file on their Desktop with all there passwords in it? Do you write you account information and passwords on a sticky-note? I sure hope not! But if you do, consider encrypting that password file with high-grade encryption using reliable freeware.<\/p>\n<p>I will review three free encryption applications; CCrypt, AxCrypt, and OpenSSL.<\/p>\n<p><!--more--><br \/>\n1. <a href=\"http:\/\/ccrypt.sourceforge.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">CCrypt <\/a><\/p>\n<p style=\"padding-left: 30px;\"><strong>Pros:<\/strong> I admire it&#8217;s simplicity, how easy it is to pop open a terminal and run the command:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\">$ ccrypt -e file2encrypt.txt\r\n$ Enter encryption key: {your password}\r\n$ Enter encryption key: (repeat) {your password}\r\n<\/pre>\n<p style=\"padding-left: 30px;\">And you are left with an password encrypted AES file with the file extension CPT.<br \/>\nTo decrypt run the command:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\">$ ccrypt -d file2encrypt.cpt\r\n<\/pre>\n<p style=\"padding-left: 30px;\">Before and After:<br \/>\n<a href=\"https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/ccrypt-screen.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3586\" src=\"https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/ccrypt-screen-267x300.png\" alt=\"\" width=\"600\" height=\"675\" srcset=\"https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/ccrypt-screen-267x300.png 267w, https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/ccrypt-screen.png 620w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p style=\"padding-left: 30px;\"><strong>Cons:<\/strong> AES encryption using a passworde is only as strong as the password itself. The majority of attacks against the AES algorithm are brute-force and dictionary attacks. Therefore, I would recommend a password that is at least 12 characters long and contains, alphanumeric, symbols, etc. More information on password strengths vs brute-force attacks see here.<\/p>\n<p>2. <a href=\"http:\/\/www.axantum.com\/axcrypt\/\" target=\"_blank\" rel=\"noopener noreferrer\">AxCrypt<\/a><\/p>\n<p style=\"padding-left: 30px;\"><strong>Pros:<\/strong> great integration with Windows OS. Installable and context-menu integration, just right-click on a file and choose AxCrypt &#8211;&gt; Encrypt. Check <a href=\"http:\/\/www.axantum.com\/AxCrypt\/HowToUse.html\" target=\"_blank\" rel=\"noopener noreferrer\">here <\/a>for screenshots and usability. Uses AES encryption which is well known and documented. Has the ability to make a Key-File to be used with encryption\/decryption. Conveniently Encrypt to exe(good and bad). Also, provided on their website is a portable Decrypt Only EXE. Allowing you to decrypt AxCrypt encrypted files without having to install the full application.<\/p>\n<p style=\"padding-left: 30px;\">Screenshots:<br \/>\n<img decoding=\"async\" src=\"https:\/\/i1-win.softpedia-static.com\/screenshots\/AxCrypt_1.png?1342852868\" alt=\"\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/i1-win.softpedia-static.com\/screenshots\/AxCrypt_2.png?1342852868\" alt=\"\" \/><\/p>\n<p style=\"padding-left: 30px;\"><strong>Cons: <\/strong>Windows only specific, not cross compatible with other operating systems. (runs under <a href=\"http:\/\/winehq.com\" target=\"_blank\" rel=\"noopener noreferrer\">wine <\/a>great!). AES 128-bit only.<\/p>\n<p>3. <a href=\"http:\/\/www.openssl.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Openssl<\/a><\/p>\n<p style=\"padding-left: 30px;\"><strong>Pros:<\/strong> Free open source software. Widely know suite of encryption algorithms. Multi-platform compatibility. Advanced users.<br \/>\nOpenSSL Commands for AES256 encryption using password:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\">openssl enc -aes-256-cbc -a -salt -in {file-to-encrypt} -out {encrypted-file-name}\r\nenter aes-256-cbc encryption password: {your password}\r\nVerifying - enter aes-256-cbc encryption password: {your password}\r\n<\/pre>\n<p style=\"padding-left: 30px;\">To decrypt:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\">openssl enc -d -aes-256-cbc -a -salt -in {encypted file} -out {unencrypted file}\r\n<\/pre>\n<p style=\"padding-left: 30px;\"><small>Notes: <strong>-a<\/strong> is used to run the encryption through base64 encoding. Useful for sending the encrypted string over email and such. <strong>-d<\/strong> is used for decryption.<\/small><\/p>\n<p style=\"padding-left: 30px;\">Screen captures:<br \/>\n<a href=\"https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/openssl-aes-screen.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3588\" src=\"https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/openssl-aes-screen-267x300.png\" alt=\"\" width=\"600\" height=\"675\" srcset=\"https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/openssl-aes-screen-267x300.png 267w, https:\/\/infotechguy.net\/wp-content\/uploads\/2021\/03\/openssl-aes-screen.png 619w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p style=\"padding-left: 30px;\"><strong>Cons:<\/strong> Transferability. Meaning, if you don&#8217;t know what the original user encryption algorithm was then you won&#8217;t know which algorithm to use to decrypt.<\/p>\n<p style=\"padding-left: 30px;\">Sources:<br \/>\n<a title=\"AES wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noopener noreferrer\">AES Wikipedia<\/a><br \/>\n<a title=\"Ccrypt Site\" href=\"http:\/\/ccrypt.sourceforge.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">CCrypt Web Site<\/a><br \/>\n<a href=\"http:\/\/www.madboa.com\/geek\/openssl\/#encrypt-simple\" target=\"_blank\" rel=\"noopener noreferrer\">OpenSSL Command-Line HOWTO<\/a><br \/>\n<a title=\"About AxCrypt \" href=\"http:\/\/www.axantum.com\/AxCrypt\/Security.html\" target=\"_blank\" rel=\"noopener noreferrer\">About AxCrypt<\/a><br \/>\n<a href=\"http:\/\/www.axantum.com\/AxCrypt\/HowToUse.html\" target=\"_blank\" rel=\"noopener noreferrer\">HowToUse AxCrypt<\/a><br \/>\n<a title=\"AxCrypt Screenshots provided by Softpedia\" href=\"http:\/\/www.softpedia.com\/progScreenshots\/AxCrypt-Screenshot-4140.html\" target=\"_blank\" rel=\"noopener noreferrer\">AxCrypt Screenshots provided by Softpedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you someone who keeps a text file on their Desktop with all there passwords in it? Do you write you account information and passwords on a sticky-note? I sure hope not! But if you&#46;&#46;&#46;<\/p>\n","protected":false},"author":2,"featured_media":4240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[112],"class_list":["post-64","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-security-2"],"_links":{"self":[{"href":"https:\/\/infotechguy.net\/index.php?rest_route=\/wp\/v2\/posts\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infotechguy.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infotechguy.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infotechguy.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/infotechguy.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=64"}],"version-history":[{"count":2,"href":"https:\/\/infotechguy.net\/index.php?rest_route=\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":4276,"href":"https:\/\/infotechguy.net\/index.php?rest_route=\/wp\/v2\/posts\/64\/revisions\/4276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infotechguy.net\/index.php?rest_route=\/wp\/v2\/media\/4240"}],"wp:attachment":[{"href":"https:\/\/infotechguy.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infotechguy.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infotechguy.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}