Encryption: Two Type of Encryption 1. Symmetric 2. Asymmetric
Encryption: Two Type of Encryption 1. Symmetric 2. Asymmetric
Encryption: Two Type of Encryption 1. Symmetric 2. Asymmetric
1
Encryption Cont.
Asymmetric Encryption
Two keys are used one is public and other is private
Public key is used for encryption and private key used for decryption.
1. Use gpg command to generate public and private 3. Login from user2 and import user1 public key and
key pair. then encrypt a file and send back to user1 & user1
$ gpg --gen-key will decrypt this file by it’s private key
2
LUKS (Linux Unified Key Setup)
Linux Unified Key Setup-on-disk-format (or LUKS) allows you to encrypt partitions on your Linux
computer. This is particularly important when it comes to mobile computers and removable media.
LUKS allows multiple user keys to decrypt a master key which is used for the bulk encryption of the
partition.
Overview of LUKS
• What LUKS doesLUKS encrypts entire block devices and is therefore well-suited for protecting the
contents of mobile devices such as removable storage media or laptop disk drives.
• The underlying contents of the encrypted block device are arbitrary. This makes it useful for
encrypting swap devices. This can also be useful with certain databases that use specially formatted
block devices for data storage.
• LUKS uses the existing device mapper kernel subsystem.
• LUKS provides passphrase strengthening which protects against dictionary attacks.
• LUKS devices contain multiple key slots, allowing users to add backup keys/passphrases.
What LUKS does not do:
• LUKS is not well-suited for applications requiring many (more than eight) users to have distinct
access keys to the same device.
• LUKS is not well-suited for applications requiring file-level encryption.
3
LUKS