<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Crypt_%28Unix%29</id>
	<title>Crypt (Unix) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Crypt_%28Unix%29"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Crypt_(Unix)&amp;action=history"/>
	<updated>2026-05-15T10:23:01Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Crypt_(Unix)&amp;diff=2340&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;In Unix computing, '''crypt''' is a utility program used for encryption. Due to the ease of breaking it, it is considered to be obsolete.  ==History==...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Crypt_(Unix)&amp;diff=2340&amp;oldid=prev"/>
		<updated>2019-03-20T04:15:26Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;In &lt;a href=&quot;/index.php?title=Unix&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Unix (page does not exist)&quot;&gt;Unix&lt;/a&gt; computing, &amp;#039;&amp;#039;&amp;#039;crypt&amp;#039;&amp;#039;&amp;#039; is a &lt;a href=&quot;/index.php?title=Utility_software&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Utility software (page does not exist)&quot;&gt;utility program&lt;/a&gt; used for encryption. Due to the ease of breaking it, it is considered to be obsolete.  ==History==...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;In [[Unix]] computing, '''crypt''' is a [[utility software|utility program]] used for encryption. Due to the ease of breaking it, it is considered to be obsolete.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Robert Morris (cryptographer)|Robert Morris]] wrote &amp;amp;lt;tt&amp;amp;gt;crypt&amp;amp;lt;/tt&amp;amp;gt;, which first appeared in [[Version 3 Unix]], to encourage codebreaking experiments; Morris himself broke &amp;amp;lt;tt&amp;amp;gt;crypt&amp;amp;lt;/tt&amp;amp;gt; by hand. [[Dennis M. Ritchie]] automated decryption with a method by James Reeds, and an improved version appeared in [[Version 7 Unix|Version 7]] which Reeds and [[Peter J. Weinberger]] also broke.&lt;br /&gt;
&lt;br /&gt;
== Relationship to password hash function ==&lt;br /&gt;
There is also a Unix [[password hash]] function with the same name, [[Crypt (C)|crypt]]. Though both are used for encrypting data in some sense, they are otherwise essentially unrelated. To distinguish between the two, writers often refer to the utility program as '''''crypt(1)''''', because it is documented in section 1 of the Unix [[Manual page (Unix)|manual pages]], and refer to the password hash function as '''''crypt(3)''''', because its documentation is in manual section 3.&lt;br /&gt;
&lt;br /&gt;
== Command filter ''crypt(1)'' ==&lt;br /&gt;
''crypt(1)'' is a simple command to encrypt or decrypt data. Usually this is used as a [[filter (Unix)|filter]], and it has traditionally been implemented using an [[algorithm]] based on the [[Enigma machine]]. It is considered to be far too [[cryptography|cryptographically]] weak to provide any security against [[Brute-force attack|brute force attacks]] by modern, commodity [[personal computer]]s.&lt;br /&gt;
&lt;br /&gt;
Some versions of Unix shipped with an even weaker version of the ''crypt(1)'' command in order to comply with contemporaneous laws and regulations, which limited the exportation of cryptographic software (for example by classifying them as [[munition]]s). Some of these were simply implementations of the [[Caesar cipher]] (effectively no more secure than [[ROT13]], which is implemented as a Caesar cipher with a well known key).&lt;br /&gt;
&lt;br /&gt;
=== ''crypt(1)'' under Linux ===&lt;br /&gt;
&lt;br /&gt;
[[Linux distribution]]s generally do not include a Unix compatible version of the ''crypt'' command. This is largely due to a combination of three major factors:&lt;br /&gt;
&lt;br /&gt;
# ''crypt'' is relatively obscure and rarely used for e-mail attachments nor as a file format&lt;br /&gt;
# ''crypt'' is considered far too cryptographically weak to withstand [[brute force attack]]s by modern computing systems (Linux systems generally ship with [[GNU Privacy Guard]] which is considered to be reasonably secure by modern standards)&lt;br /&gt;
# During the early years of Linux development and adoption there was some concern that even as weak as the algorithm used by ''crypt'' was, that it might still run afoul of [[ITAR]]'s export controls; so mainstream distribution developers in the [[United States]] generally excluded it (and left their customers to fetch GnuPG or other strong cryptographic software from international sites, sometimes providing packages or scripts to automate that process).&lt;br /&gt;
&lt;br /&gt;
The source code to several old versions of the ''crypt'' command is available in The Unix Heritage Society's [http://www.tuhs.org/archive_sites.html Unix Archive].&lt;br /&gt;
&lt;br /&gt;
The recent crypt source code is available in the [[OpenSolaris]] project.&lt;br /&gt;
&lt;br /&gt;
Enhanced [[Symmetric-key algorithm|symmetric encryption]] utilities are available for Linux (and should also be [[Software portability|portable]] to any other [[Unix-like]] system) including [[mcrypt]] and [[ccrypt]]. While these provide support for much more sophisticated and modern algorithms, they can be used to encrypt and decrypt files which are compatible with the traditional ''crypt(1)'' command by providing the correct command line options.&lt;br /&gt;
&lt;br /&gt;
=== Breaking crypt(1) encryption ===&lt;br /&gt;
&lt;br /&gt;
Programs for breaking crypt(1) encryption are widely available. Bob Baldwin's Crypt Breaker's Workbench, which was written in 1984-1985, is an interactive tool that provides successive plaintext guesses that must be corrected by the user. Peter Selinger's unixcrypt-breaker uses a simple statistical model to guess plausible plaintexts, and does not require user interaction.&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
[[Category:Cryptography]]&lt;br /&gt;
[[Category:Cryptographic algorithms]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>