Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Crypt (C)

Index Crypt (C)

crypt is the library function which is used to compute a password hash that can be used to store user account passwords while keeping them relatively secure (a passwd file). [1]

38 relations: Backward compatibility, Base64, Bcrypt, Berkeley Software Design, Blowfish (cipher), Code, Crypt (Unix), Cryptographic hash function, Data Encryption Standard, Dictionary attack, GNU C Library, Integrated Windows Authentication, Key derivation function, Known-plaintext attack, Linux, M-209, Man page, MD4, MD5, Moore's law, National Institute of Standards and Technology, Niels Provos, NT LAN Manager, Passwd, Password Hashing Competition, Perl, PHP, Pike (programming language), Poul-Henning Kamp, Python (programming language), Red Hat, Ruby (programming language), Salt (cryptography), Serialization, SHA-2, Sun Microsystems, USENIX, Version 7 Unix.

Backward compatibility

Backward compatibility is a property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing.

New!!: Crypt (C) and Backward compatibility · See more »

Base64

Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation.

New!!: Crypt (C) and Base64 · See more »

Bcrypt

bcrypt is a password hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher, and presented at USENIX in 1999.

New!!: Crypt (C) and Bcrypt · See more »

Berkeley Software Design

Berkeley Software Design Inc. (BSDI or, later, BSDi) was a corporation which developed, sold licenses for, and supported BSD/OS (originally known as BSD/386), a commercial and partially proprietary variant of the BSD Unix operating system for PC compatible (and later, other) computer systems.

New!!: Crypt (C) and Berkeley Software Design · See more »

Blowfish (cipher)

Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.

New!!: Crypt (C) and Blowfish (cipher) · See more »

Code

In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form or representation, sometimes shortened or secret, for communication through a communication channel or storage in a storage medium.

New!!: Crypt (C) and Code · See more »

Crypt (Unix)

In Unix computing, crypt is a utility program used for encryption.

New!!: Crypt (C) and Crypt (Unix) · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Crypt (C) and Cryptographic hash function · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Crypt (C) and Data Encryption Standard · See more »

Dictionary attack

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

New!!: Crypt (C) and Dictionary attack · See more »

GNU C Library

The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library.

New!!: Crypt (C) and GNU C Library · See more »

Integrated Windows Authentication

Integrated Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT-based operating systems.

New!!: Crypt (C) and Integrated Windows Authentication · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Crypt (C) and Key derivation function · See more »

Known-plaintext attack

The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).

New!!: Crypt (C) and Known-plaintext attack · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Crypt (C) and Linux · See more »

M-209

In cryptography, the M-209, designated CSP-1500 by the United States Navy (C-38 by the manufacturer) is a portable, mechanical cipher machine used by the US military primarily in World War II, though it remained in active use through the Korean War.

New!!: Crypt (C) and M-209 · See more »

Man page

A man page (short for manual page) is a form of software documentation usually found on a Unix or Unix-like operating system.

New!!: Crypt (C) and Man page · See more »

MD4

The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.

New!!: Crypt (C) and MD4 · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Crypt (C) and MD5 · See more »

Moore's law

Moore's law is the observation that the number of transistors in a dense integrated circuit doubles about every two years.

New!!: Crypt (C) and Moore's law · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Crypt (C) and National Institute of Standards and Technology · See more »

Niels Provos

Niels Provos is a researcher in the areas of secure systems, malware and cryptography.

New!!: Crypt (C) and Niels Provos · See more »

NT LAN Manager

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.

New!!: Crypt (C) and NT LAN Manager · See more »

Passwd

passwd is a tool on most Unix and Unix-like operating systems used to change a user's password.

New!!: Crypt (C) and Passwd · See more »

Password Hashing Competition

The Password Hashing Competition was an open competition announced in 2013 to select one or more password hash functions that can be recognized as a recommended standard.

New!!: Crypt (C) and Password Hashing Competition · See more »

Perl

Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages, Perl 5 and Perl 6.

New!!: Crypt (C) and Perl · See more »

PHP

PHP: Hypertext Preprocessor (or simply PHP) is a server-side scripting language designed for Web development, but also used as a general-purpose programming language.

New!!: Crypt (C) and PHP · See more »

Pike (programming language)

Pike is an interpreted, general-purpose, high-level, cross-platform, dynamic programming language, with a syntax similar to that of C. Unlike many other dynamic languages, Pike is both statically and dynamically typed, and requires explicit type definitions.

New!!: Crypt (C) and Pike (programming language) · See more »

Poul-Henning Kamp

Poul-Henning Kamp (born 1966) is a Danish computer software developer known for work on various projects.

New!!: Crypt (C) and Poul-Henning Kamp · See more »

Python (programming language)

Python is an interpreted high-level programming language for general-purpose programming.

New!!: Crypt (C) and Python (programming language) · See more »

Red Hat

Red Hat, Inc. is an American multinational software company providing open-source software products to the enterprise community.

New!!: Crypt (C) and Red Hat · See more »

Ruby (programming language)

Ruby is a dynamic, interpreted, reflective, object-oriented, general-purpose programming language.

New!!: Crypt (C) and Ruby (programming language) · See more »

Salt (cryptography)

In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.

New!!: Crypt (C) and Salt (cryptography) · See more »

Serialization

In computer science, in the context of data storage, serialization is the process of translating data structures or object state into a format that can be stored (for example, in a file or memory buffer) or transmitted (for example, across a network connection link) and reconstructed later (possibly in a different computer environment).

New!!: Crypt (C) and Serialization · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Crypt (C) and SHA-2 · See more »

Sun Microsystems

Sun Microsystems, Inc. was an American company that sold computers, computer components, software, and information technology services and created the Java programming language, the Solaris operating system, ZFS, the Network File System (NFS), and SPARC.

New!!: Crypt (C) and Sun Microsystems · See more »

USENIX

The USENIX Association is the Advanced Computing Systems Association.

New!!: Crypt (C) and USENIX · See more »

Version 7 Unix

Seventh Edition Unix, also called Version 7 Unix, Version 7 or just V7, was an important early release of the Unix operating system.

New!!: Crypt (C) and Version 7 Unix · See more »

Redirects here:

Crypt (3), Crypt(3), Md5crypt, Modular Crypt Format.

References

[1] https://en.wikipedia.org/wiki/Crypt_(C)

OutgoingIncoming
Hey! We are on Facebook now! »