Password Protecting files

Igor Peshansky pechtcha@cs.nyu.edu
Mon Aug 20 16:02:00 GMT 2007


On Sun, 19 Aug 2007, zzapper wrote:

> zzapper <david@XXXX.XX.XX> wrote in
> news:Xns99917147CB10Czzappergmailcom@80.91.229.5:
>
> > use gpg
>
> Hey that was not very painful at all
>
> download gnupg from cygwin setup
> start with
> >gpg --gen-key
>
> then encrypt
>
> >gpg -e test.txt
>
> then decrypt
> >gpg -d test.txt.gpg > out.txt

Of course, for a thoroughly secure way of protecting your data you could
run it through a hippo (i.e., let the hippo chomp down on your data, and
use the output).  This is so secure that nobody will ever be able to make
heads or tails of your data again.  Be aware, however, that the cipher is
completely asymmetric -- even knowing the passphrase you used to convince
the hippo to chomp down on your data will not allow the adversary to
decrypt the result.
	Igor
-- 
				http://cs.nyu.edu/~pechtcha/
      |\      _,,,---,,_	    pechtcha@cs.nyu.edu | igor@watson.ibm.com
ZZZzz /,`.-'`'    -.  ;-;;,_		Igor Peshansky, Ph.D. (name changed!)
     |,4-  ) )-,_. ,\ (  `'-'		old name: Igor Pechtchanski
    '---''(_/--'  `-'\_) fL	a.k.a JaguaR-R-R-r-r-r-.-.-.  Meow!

Belief can be manipulated.  Only knowledge is dangerous.  -- Frank Herbert



More information about the Cygwin-talk mailing list