• Tidak ada hasil yang ditemukan

Worked out Examples - Nptel

N/A
N/A
Protected

Academic year: 2024

Membagikan "Worked out Examples - Nptel"

Copied!
1
0
0

Teks penuh

(1)

Operating Systems/OS and Security Worked out Examples

P.C.P.Bhat/IISc Bangalore M9/V1/June 04/1

Worked out Examples

9.1 What is most basic Encryption scheme used for file protection?

Encryption is one of the best thing to secure the file. it can be used in various level.but one of the simple way to do is to use the encryption key. using this key the owner can encrypt his own file. this encrypted file is garbage for the others. the file only can be seen if it is again decrypted back to its original form using the required encryption key .

Commands used for encryption is as follows:

crypt encryption_key <input_file _name> output_file_name

this command will encrypt the input file using encryption key and its output is stored as output_file_name.

again for getting back the original file we can use the following commands..

crypt encryption_key <output_file_name> input_file_name

Referensi

Dokumen terkait