<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://strudel.pld.ttu.ee/wiki/e/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marek</id>
		<title>ATI public wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://strudel.pld.ttu.ee/wiki/e/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marek"/>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php/Special:Contributions/Marek"/>
		<updated>2026-04-13T16:41:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.4</generator>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3136</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3136"/>
				<updated>2023-08-16T12:29:59Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;| 0 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;| 0&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt || 1 komplekt &lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti || 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit || 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt || 1 komplekt&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3135</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3135"/>
				<updated>2023-08-16T12:08:59Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 4 || align=&amp;quot;right&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt || 1 komplekt &lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti || 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt || 1 komplekt&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3134</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3134"/>
				<updated>2023-08-16T12:08:17Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 4 || align=&amp;quot;right&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt || 1 komplekt &lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti || 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt || 1 komplekt&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3133</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3133"/>
				<updated>2023-08-16T11:42:40Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 7 || align=&amp;quot;right&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt || 1 komplekt &lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti || 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt || 1 komplekt&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3132</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3132"/>
				<updated>2023-08-16T11:34:40Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 8 || align=&amp;quot;right&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt || 1 komplekt &lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti || 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt || 1 komplekt&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3131</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3131"/>
				<updated>2023-08-16T11:08:40Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 10 || align=&amp;quot;right&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt || 1 komplekt &lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti || 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3130</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3130"/>
				<updated>2023-08-16T10:50:17Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 14 || align=&amp;quot;right&amp;quot; | 11&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt || 1 komplekt &lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3129</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3129"/>
				<updated>2023-08-16T10:33:25Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 15 || align=&amp;quot;right&amp;quot; | 12&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori || 3 monitori&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt || 1 komplekt&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3128</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3128"/>
				<updated>2023-08-16T09:59:33Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 16 || align=&amp;quot;right&amp;quot; | 16&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 5 komplekti + 2 arvutit&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3127</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3127"/>
				<updated>2023-08-16T09:28:07Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 17 || align=&amp;quot;right&amp;quot; | 15&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 6 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3126</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3126"/>
				<updated>2023-08-16T07:51:05Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 19 || align=&amp;quot;right&amp;quot; | 17&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 5 komplekti + 2 arvutit || 6 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| Gert Toming || 1 komplekt ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3125</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3125"/>
				<updated>2023-08-15T15:38:57Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;| 31 || align=&amp;quot;right&amp;quot; bgcolor=&amp;quot;red&amp;quot;| 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 19 || align=&amp;quot;right&amp;quot; | 17&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti || 6 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3124</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3124"/>
				<updated>2023-08-15T15:34:45Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 31 || align=&amp;quot;right&amp;quot; | 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 19 || align=&amp;quot;right&amp;quot; | 17&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti ||  1 komplekt + 1 arvuti&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti || 6 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3123</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3123"/>
				<updated>2023-08-15T15:24:23Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 31 || align=&amp;quot;right&amp;quot; | 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 21 || align=&amp;quot;right&amp;quot; | 18&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti || 2 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti || 6 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3122</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3122"/>
				<updated>2023-08-15T14:58:26Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 31 || align=&amp;quot;right&amp;quot; | 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 23 || align=&amp;quot;right&amp;quot; | 20&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti || 6 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor || 2 komplekti + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3121</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3121"/>
				<updated>2023-08-15T14:40:13Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 31 || align=&amp;quot;right&amp;quot; | 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 25 || align=&amp;quot;right&amp;quot; | 23&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor || 1 komplekt + 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti || 6 komplekti&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3120</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3120"/>
				<updated>2023-08-15T14:23:14Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 31 || align=&amp;quot;right&amp;quot; | 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 32 || align=&amp;quot;right&amp;quot; | 30&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt + 1 arvuti||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3119</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3119"/>
				<updated>2023-08-15T14:05:28Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 30 || align=&amp;quot;right&amp;quot; | 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 32 || align=&amp;quot;right&amp;quot; | 30&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Anton Tšertov || 1 arvuti ||&lt;br /&gt;
|-&lt;br /&gt;
| Karl Janson || 2 arvutit ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3118</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3118"/>
				<updated>2023-08-15T13:50:05Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 27 || align=&amp;quot;right&amp;quot; | 33&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 32 || align=&amp;quot;right&amp;quot; | 30&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Elizaveta Dubrovinskaya || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Jürgen Soom || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Saleh Ragheb Saleh Alsaleh || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3117</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3117"/>
				<updated>2023-08-15T13:38:30Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable &lt;br /&gt;
! !! arvuteid !! monitore&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Reserveeritud: || align=&amp;quot;right&amp;quot; | 22 || align=&amp;quot;right&amp;quot; | 28&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | Järgi on: || align=&amp;quot;right&amp;quot; | 32 || align=&amp;quot;right&amp;quot; | 30&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3116</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3116"/>
				<updated>2023-08-15T13:20:48Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* Soovijad */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Järgi on:  32 arvutit   30 monitori&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot; align=&amp;quot;left&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Konstantin Shibin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Mairo Leier || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Priit Ruberg || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Risto Heinsar || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Peeter Ellervee || 1 komplekt + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Harri Lensen || 6 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| Asko Ristolainen || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Natalia Cherezova || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Hardi Selg || 2 komplekti + 1 monitor ||&lt;br /&gt;
|-&lt;br /&gt;
| Marek Mandre || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3115</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3115"/>
				<updated>2023-08-15T12:41:33Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Järgi on:  32 arvutit   30 monitori&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot; align=&amp;quot;left&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Instituut ise || 1 komplekt || igaks juhuks varuks&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| Artur Jutman || 2 komplekti ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3114</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3114"/>
				<updated>2023-08-15T12:39:30Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* Soovijad */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Järgi on:  33 arvutit   31 monitori&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot; align=&amp;quot;left&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
| Maksim Jenihhin || 1 komplekt ||&lt;br /&gt;
|-&lt;br /&gt;
| Aleksei Tepljakov || 3 monitori ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|-&lt;br /&gt;
| || ||&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3113</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3113"/>
				<updated>2023-08-15T12:37:27Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Järgi on:  33 arvutit   31 monitori&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot; align=&amp;quot;left&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Nimi !! küsitud !! kätte antud&lt;br /&gt;
|-&lt;br /&gt;
| Katrin Tõemets || 1 komplekt || 1 monitor, arvuti on ootel&lt;br /&gt;
|-&lt;br /&gt;
| Mohammad Hasan Ahmadilivani || 1 monitor || 1 monitor&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3112</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3112"/>
				<updated>2023-08-15T12:31:15Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Vanad ICT-501 klassi arvutid ===&lt;br /&gt;
&lt;br /&gt;
33 komplekti: arvuti + monitor + klaviatuur + hiir.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Järgi on:  33 arvutit   31 monitori&lt;br /&gt;
&lt;br /&gt;
==== Arvuti ====&lt;br /&gt;
'HP EliteDesk 800 G3 SFF'&lt;br /&gt;
* i5-7500 CPU&lt;br /&gt;
* 16GB RAM&lt;br /&gt;
* NVIDIA GT720 GPU&lt;br /&gt;
* 512GB SSD, suht surnud (kulunud)&lt;br /&gt;
* 1TB 5200RPM 'green' HDD, super aeglane&lt;br /&gt;
==== Monitor ====&lt;br /&gt;
'Monitor AOC U2879VF 28&amp;quot; 4K'&lt;br /&gt;
* 28&amp;quot; ekraani diameeter&lt;br /&gt;
* 3840x2160 resolutsioon&lt;br /&gt;
* HDMI input&lt;br /&gt;
* DP input&lt;br /&gt;
* VGA input&lt;br /&gt;
* DVI input&lt;br /&gt;
&lt;br /&gt;
=== Soovijad ===&lt;br /&gt;
&lt;br /&gt;
* Katrin Tõemets : 1 komplekt. Käes: 1 monitor, arvuti on ootel.&lt;br /&gt;
* Mohammad Hasan Ahmadilivani : 1 monitor. Käes: 1 monitor.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3111</id>
		<title>Arvutiklassi vanad arvutid</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Arvutiklassi_vanad_arvutid&amp;diff=3111"/>
				<updated>2023-08-15T10:57:04Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: Created page with &amp;quot;.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Blist2&amp;diff=3103</id>
		<title>Blist2</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Blist2&amp;diff=3103"/>
				<updated>2022-11-27T14:27:09Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: Replaced content with &amp;quot;__FORCETOC__&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Blist&amp;diff=3102</id>
		<title>Blist</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Blist&amp;diff=3102"/>
				<updated>2022-11-27T14:26:11Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: Replaced content with &amp;quot;__FORCETOC__&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=CAD_tarkvara&amp;diff=3093</id>
		<title>CAD tarkvara</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=CAD_tarkvara&amp;diff=3093"/>
				<updated>2022-04-20T10:51:36Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Enamus tarkvara pärineb meil EUROPRACTICE'st , http://www.europractice.stfc.ac.uk/index.html#vendors&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*[[Cadence]] , http://www.europractice.stfc.ac.uk/tools/cadence.html&lt;br /&gt;
**IC Package : 13 litsentsi&lt;br /&gt;
**Combined IC &amp;amp; Systems Package : 2 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Siemens Mentor Graphics , http://www.europractice.stfc.ac.uk/tools/siemens.html&lt;br /&gt;
**Full Siemens Mentor Graphics Suite: 40 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Synopsys , http://www.europractice.stfc.ac.uk/tools/synopsys.html&lt;br /&gt;
**Front End and Verification Suite : 9 litsentsi&lt;br /&gt;
**Analogue Simulation &amp;amp; Modelling Suite : 4 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*AMD Xilinx , http://www.europractice.stfc.ac.uk/tools/xilinx.html&lt;br /&gt;
**Vivado Suite : 50 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Intel Quartus , http://www.europractice.stfc.ac.uk/tools/intel_fpga.html&lt;br /&gt;
**Quartus : 10 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*[http://www.goepel.com Goepel] : 10 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Sergei Devadze , ICT-506&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=CAD_tarkvara&amp;diff=3092</id>
		<title>CAD tarkvara</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=CAD_tarkvara&amp;diff=3092"/>
				<updated>2022-04-20T10:47:29Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Enamus tarkvara pärineb meil EUROPRACTICE'st , http://www.europractice.stfc.ac.uk/index.html#vendors&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*[[Cadence]] , http://www.europractice.stfc.ac.uk/tools/cadence.html&lt;br /&gt;
**IC Package : 13 litsentsi&lt;br /&gt;
**Combined IC &amp;amp; Systems Package : 2 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Siemens Mentor Graphics , http://www.europractice.stfc.ac.uk/tools/siemens.html&lt;br /&gt;
**Full Siemens Mentor Graphics Suite: 40 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Synopsys , http://www.europractice.stfc.ac.uk/tools/synopsys.html&lt;br /&gt;
**Front End and Verification : 9 litsentsi&lt;br /&gt;
**Analogue Simulation &amp;amp; Modelling Suite : 4 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*AMD Xilinx , http://www.europractice.stfc.ac.uk/tools/xilinx.html&lt;br /&gt;
**Vivado Suite : 50 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Intel Quartus , http://www.europractice.stfc.ac.uk/tools/intel_fpga.html&lt;br /&gt;
**Quartus : 10 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Marek Mandre , ICT-515&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*[http://www.goepel.com Goepel] : 10 litsentsi&lt;br /&gt;
&lt;br /&gt;
:kontaktisik: Sergei Devadze , ICT-506&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=CAD_tarkvara&amp;diff=3091</id>
		<title>CAD tarkvara</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=CAD_tarkvara&amp;diff=3091"/>
				<updated>2022-04-20T10:41:21Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Enamus tarkvara pärineb meil EUROPRACTICE'st , http://www.europractice.stfc.ac.uk/index.html#vendors&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*[[Cadence]] , http://www.europractice.stfc.ac.uk/tools/cadence.html&lt;br /&gt;
**IC Package : 13 litsentsi&lt;br /&gt;
**Combined IC &amp;amp; Systems Package : 2 litsentsi&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Siemens Mentor Graphics , http://www.europractice.stfc.ac.uk/tools/siemens.html&lt;br /&gt;
**Full Siemens Mentor Graphics Suite: 40 litsentsi&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Synopsys , http://www.europractice.stfc.ac.uk/tools/synopsys.html&lt;br /&gt;
**Front End and Verification : 9 litsentsi&lt;br /&gt;
**Analogue Simulation &amp;amp; Modelling Suite : 4 litsentsi&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*AMD Xilinx , http://www.europractice.stfc.ac.uk/tools/xilinx.html&lt;br /&gt;
**Vivado Suite : 50 litsentsi&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*[http://www.goepel.com Goepel] : 10 litsentsi&lt;br /&gt;
&lt;br /&gt;
kontaktisik: Sergei Devadze , ICT-506&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3014</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3014"/>
				<updated>2020-09-10T16:11:00Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD==&lt;br /&gt;
&lt;br /&gt;
Appears due to broken NFS locks&lt;br /&gt;
&lt;br /&gt;
Usually after abnormal network outage between NFS storage server and client system where RRDTOOL works&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Another fix===&lt;br /&gt;
restart both systems&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3013</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3013"/>
				<updated>2020-09-10T16:10:44Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD==&lt;br /&gt;
&lt;br /&gt;
Appears due to broken NFS locks&lt;br /&gt;
&lt;br /&gt;
Usually after abnormal network outage between NFS storage server and client system where RRDTOOL works&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Another fix===&lt;br /&gt;
restart both servers&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3012</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3012"/>
				<updated>2020-09-10T16:10:08Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD==&lt;br /&gt;
&lt;br /&gt;
Appears due to broken NFS locks&lt;br /&gt;
&lt;br /&gt;
Usually after abnormal network outage between NFS storage server and client system where RRDTOOL works&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3011</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3011"/>
				<updated>2020-09-10T16:10:01Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD==&lt;br /&gt;
&lt;br /&gt;
Appears due to broken NFS locks&lt;br /&gt;
Usually after abnormal network outage between NFS storage server and client system where RRDTOOL works&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3010</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3010"/>
				<updated>2020-09-10T16:08:05Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD==&lt;br /&gt;
&lt;br /&gt;
Appears due to broken NFS locks&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3009</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3009"/>
				<updated>2020-09-10T16:07:06Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD==&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3008</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3008"/>
				<updated>2020-09-10T16:06:54Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* Fix */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD===&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3007</id>
		<title>RRDTool</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=RRDTool&amp;diff=3007"/>
				<updated>2020-09-10T16:06:16Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: Created page with &amp;quot;__TOC__  =RRDTOOL=  ==ERROR: could not lock RRD===  ===Fix=== &amp;lt;code&amp;gt; mv dbase.rrd dbase.rrd.old cp dbase.rrd.old dbase.rrd rm dbase.rrd.old &amp;lt;/code&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=RRDTOOL=&lt;br /&gt;
&lt;br /&gt;
==ERROR: could not lock RRD===&lt;br /&gt;
&lt;br /&gt;
===Fix===&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
mv dbase.rrd dbase.rrd.old&lt;br /&gt;
cp dbase.rrd.old dbase.rrd&lt;br /&gt;
rm dbase.rrd.old&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=Areng20-30&amp;diff=2893</id>
		<title>Areng20-30</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=Areng20-30&amp;diff=2893"/>
				<updated>2019-12-18T12:41:44Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* 2020 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
==Ühekordsed suured kulutused==&lt;br /&gt;
&lt;br /&gt;
näit. mingi teadusprojekti väga spetsiifilise vahendi ühekordne ost, uue tarkvara baasmaksed, etc&lt;br /&gt;
&lt;br /&gt;
==Korduvad suured kulutused pikema ajavahemiku tagant==&lt;br /&gt;
&lt;br /&gt;
IT baas-infrastruktuur : võrguseadmed, serverid, serverite tarkvara, arvutitöökohad, printerid, laptopid etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== 2020 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# viienda (5.) korruse suurte printerite vahetus, instituudi tasemel&lt;br /&gt;
#: Xerox WorkCentre 7220 järgmine uusim põlvkond ja Xerox Phaser 3600 järgmine uusim põlvkond&lt;br /&gt;
#: kokku 3 printerit, 1 mustvalge ja 2 värvilist multifunktsionaalset&lt;br /&gt;
#* 1x Xerox VersaLink B610/DT [[http://www.office.xerox.com/latest/VB6BR-01U.pdf specs]] [[https://www.shop.xerox.com/versalink-b610-dt shop]] ~1k +km&lt;br /&gt;
#* 2x Xerox VersaLink C7030 Colour Multifunction Printer [[https://www.office.xerox.com/latest/VC7SS-01.PDF specs]] [[https://www.markit.eu/ee/en/xerox-versalink-c7020-c7025-c7030-base-unit-colour/v2p13876724 shop]] à ~3k +km&amp;lt;s&amp;gt;&lt;br /&gt;
# üks täiendav TOR 10/40/100G switch serveriruumi, teaduskonna tasemel&lt;br /&gt;
#: eelduste kohaselt 15000 EUR&lt;br /&gt;
#: Extreme Networks X690-48X-2Q-4C [[https://cloud.kapostcontent.net/pub/44317954-ef18-4082-8714-3b22a9540f32/x690-data-sheet.pdf?kui=t3jIjd3uJZgg-RyyxO3sWg specs]] [[https://www.markit.eu/ee/en/extreme-networks-summit-x690-48x-2q-4c-switch/v2p14481496 shop]] ~15k +km&amp;lt;/s&amp;gt;&lt;br /&gt;
# üks paar TOR 25/100G switche serveriruumi koos rack kit'ga, teaduskonna tasemel, RDMA (RoCE v2) tehnoloogia kasutuselevõtuks, testimiseks ja infrastruktuuri arendamiseks&lt;br /&gt;
#: eelduste kohaselt 17800 EUR&lt;br /&gt;
#: Mellanox MSN2010-CB2R [[https://www.mellanox.com/related-docs/prod_eth_switches/PB_SN2010.pdf specs]] [[https://store.mellanox.com/products/mellanox-msn2010-cb2r-spectrum-based-10-25gbe-and-100gbe-1u-open-ethernet-switch-with-mellanox-onyx-18-sfp28-ports-and-4-qsfp28-ports-rohs6.html store]] á 8590+km &lt;br /&gt;
# kuus 25G võrgukaarti teaduskonna serveritele, teaduskonna tasemel, RDMA (RoCE v2) tehnoloogia kasutuselevõtuks, testimiseks ja infrastruktuuri arendamiseks&lt;br /&gt;
#: eelduste kohaselt 3260 EUR&lt;br /&gt;
#: Mellanox MCX512A-ADAT ConnectX-5 dual port [[http://www.mellanox.com/related-docs/prod_adapter_cards/PB_ConnectX-5_EN_Card.pdf specs]] [[https://store.mellanox.com/products/mellanox-mcx512a-adat-connectx-5-ex-en-network-interface-card-25gbe-dual-port-sfp28-pcie3-0-4-0-x8-tall-bracket.html store]] á 543+km&lt;br /&gt;
# kaks 100G võrgukaarti teaduskonna serveritele, teaduskonna tasemel, RDMA (RoCE v2) tehnoloogia kasutuselevõtuks, testimiseks ja infrastruktuuri arendamiseks&lt;br /&gt;
#: eeduste kohaselt 1714 EUR&lt;br /&gt;
#: Mellanox MCX516A-CCAT ConnectX-5 dual port [[http://www.mellanox.com/related-docs/prod_adapter_cards/PB_ConnectX-5_EN_Card.pdf specs]] [[https://store.mellanox.com/products/mellanox-mcx516a-ccat-connectx-5-en-network-interface-card-100gbe-dual-port-qsfp28-pcie3-0-x16-tall-bracket-rohs-r6.html store]] á 858+km&lt;br /&gt;
# DAC 25G/100G kaablid TOR switchide ja serverite ühendamiseks, 16tk 5m pikkused, ca 1050+km&lt;br /&gt;
#: FS.COM Mellanox certified DAC [[https://www.fs.com/de-en/products/65856.html 25G]] [[https://www.fs.com/de-en/products/72705.html 100G]]&lt;br /&gt;
# kuue arvutitöökoha uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna PC koos monitoride, monitoride lauakinnituse, hiire ja klaviatuuriga ~2k +km&lt;br /&gt;
# nelja laptopi uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna laptop ~1k +km&lt;br /&gt;
# viienda (5.) korruse arvutivõrgu areng 10G suunas, instituudi tasemel&lt;br /&gt;
#* üks 1G/2.5G/5G/10G ja 20 või enama pordiga switch millel QSFP+/SFP+ uplink&lt;br /&gt;
#: NETGEAR Smart Managed Plus XS724EM [[https://www.netgear.com/business/products/switches/web-managed/XS724EM.aspx#tab-techspecs specs]] [[https://www.markit.eu/ee/en/netgear-smart-managed-plus-xs724em-switch-smart-22/v2p15411585 shop]] ~1.6k +km&lt;br /&gt;
#* kümme 1G/2.5G/5G/10G võrgukaarti&lt;br /&gt;
#: ASUS XG-C100C network adapter [[https://www.asus.com/Networking/XG-C100C/specifications specs]] [[https://www.markit.eu/ee/en/asus-xg-c100c-network-adapter-pcie-10gb-ethernet/v2p14308330c150306 shop]] ~85€ +km&lt;br /&gt;
#* kakskümmend CAT6A patch kaablit à 5€&lt;br /&gt;
# IBM Storwize v3700 laienduskast koos kettaseadmete ja ühenduskaablitega&lt;br /&gt;
#: eelduste kohaselt ~6000 EUR&lt;br /&gt;
# 4K projektori ekraanid ruumidesse ICT-501 ja ICT-507A&lt;br /&gt;
#: eelduste kohaselt ~6000 EUR&lt;br /&gt;
#: Adeo Inceel 16:9 135&amp;quot; [[http://www.adeoscreen.com/site/adeogroup90_webprofessional_it/cataloghi_prodotti/Inceel_2018_EN.pdf specs]]&lt;br /&gt;
# Extron vaheseina sensor, ~580 EUR&lt;br /&gt;
#: Extron ECM S10 [[https://www.extron.com/product/ecms10 specs]]&lt;br /&gt;
# masinõppe (Machine Learning) arendamiseks kaks Tesla T4 GPU arvutuskaarti&lt;br /&gt;
#: eelduste kohaselt ~4500 EUR&lt;br /&gt;
#: NVIDIA Tesla T4 [[https://www.nvidia.com/content/dam/en-zz/Solutions/Data-Center/tesla-t4/t4-tensor-core-product-brief.pdf specs]]&lt;br /&gt;
# masinõppe (Machine Learning) arendamiseks mälu juurde, 384GB&lt;br /&gt;
#: eelduste kohaselt ~5100 EUR&lt;br /&gt;
#: 12x Fujitsu DDR4 32 GB DIMM 288-pin 2666 MHz 1.2V registered ECC [[https://www.markit.eu/ee/en/fujitsu-ddr4-32-gb-dimm-288-pin-2666/v2p15344144 shop]]&lt;br /&gt;
# uus P-5/F-2/O-4/T-5/E-4 turvataseme ja õhufiltriga dokumendi ning CD/DVD meedia purustaja 'Dahle 516air'&lt;br /&gt;
#: eelduste kohaselt ~2000 EUR&lt;br /&gt;
#: Dahle 516air [[https://www.dahle-office.com/en/products/document-shredders/detail/product/show/security-micro-cut-document-shredder-ideal-for-particularly-sensitive-data-9/dahle-516air-en.html spec]]&lt;br /&gt;
# linux arvutusserverile mälu juurde, 768GB&lt;br /&gt;
#: eelduste kohaselt ~10200 EUR&lt;br /&gt;
#: 24x Fujitsu DDR4 32 GB DIMM 288-pin 2666 MHz 1.2V registered ECC [[https://www.markit.eu/ee/en/fujitsu-ddr4-32-gb-dimm-288-pin-2666/v2p15344144 shop]]&lt;br /&gt;
# uus 17&amp;quot; kõrgresolutsiooniga VGA USB KVM räckisahtel koos 16-Port KVM switchiga&lt;br /&gt;
#: eelduste kohaselt ~3800 EUR&lt;br /&gt;
#: NTI RACKMUX® USB KVM Drawer RACKMUX-V17HR-N-16USBHD [[https://www.networktechinc.com/kvm-drawer-switch-hd.html specs]] [[https://www.networktechinc.com/kvm-drawer-switch-hd.html#tab-6 shop]]&lt;br /&gt;
# displayde uuendus, displayd&lt;br /&gt;
#: 20x Dell UltraSharp U2717D, kokku ~6100 EUR&lt;br /&gt;
# displayde uuendus, käpad&lt;br /&gt;
#: 12x Ergotron LX Dual Side-by-Side Arm, kokku ~3300 EUR&lt;br /&gt;
# eriõppelabori &amp;lt;s&amp;gt;arvutiklassi&amp;lt;/s&amp;gt; ICT-501 graafikakiirendite ja mälu upgrade&lt;br /&gt;
#: 33x ASUS GTX1650-O4G-LP-BRK, kokku ~6100 EUR&lt;br /&gt;
#: 33x Crucial DDR4 16GB DIMM 288-pin 2400 MHz, kokku ~1750 EUR&lt;br /&gt;
# USB toiteplokke&lt;br /&gt;
#: Anker AK-A2056111 [[https://www.anker.com/products/variant/powerport-speed-pd-5/A2056111 specs]]&lt;br /&gt;
# litsentsi ja hooldusmaksud, kokku ~13.5k&lt;br /&gt;
#* EUROPRACTICE litsentside hooldusmaks ~9000 EUR&lt;br /&gt;
#* server ja klasside tarkvara hooldusmaks ~2500 EUR&lt;br /&gt;
#* server ja salvestusseadmete hooldusmaks ~2000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2020 kokku: 118404 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2021 ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;s&amp;gt;&lt;br /&gt;
# kaks täiendavat TOR 10/40/100G switch serveriruumi, teaduskonna tasemel&lt;br /&gt;
#: eelduste kohaselt 15000 EUR&lt;br /&gt;
#* Extreme Networks X690-48X-2Q-4C [[https://cloud.kapostcontent.net/pub/44317954-ef18-4082-8714-3b22a9540f32/x690-data-sheet.pdf?kui=t3jIjd3uJZgg-RyyxO3sWg specs]] [[https://www.markit.eu/ee/en/extreme-networks-summit-x690-48x-2q-4c-switch/v2p14481496 shop]] ~15k +km&lt;br /&gt;
# üks 10G/25G/40G/50G/100G aggregatsiooniswitch serveriruumi, teaduskonna tasemel&lt;br /&gt;
#* Extreme Networks X870-32c [[https://cloud.kapostcontent.net/pub/ca5eb112-e470-4ead-b391-0a6476ad5448/x870-data-sheet.pdf?kui=Z50vsU5-AH31kSdHvCZNnw specs]] [[https://www.markit.eu/ee/en/extreme-networks-extremeswitching-x870-series-x870-32c-base/v2p13723640 shop]] ~25k +km&amp;lt;/s&amp;gt;&lt;br /&gt;
# kolm paari TOR 25/100G switche serveriruumi ja IT Colledzisse koos rack kit'ga, teaduskonna tasemel, RDMA (RoCE v2) tehnoloogia kasutuselevõtuks ja infrastruktuuri arendamiseks&lt;br /&gt;
#: eelduste kohaselt 53400 EUR&lt;br /&gt;
#: Mellanox MSN2010-CB2R [[https://www.mellanox.com/related-docs/prod_eth_switches/PB_SN2010.pdf specs]] [[https://store.mellanox.com/products/mellanox-msn2010-cb2r-spectrum-based-10-25gbe-and-100gbe-1u-open-ethernet-switch-with-mellanox-onyx-18-sfp28-ports-and-4-qsfp28-ports-rohs6.html store]] á 8590+km &lt;br /&gt;
# üks paar SPINE 100G switche serveriruumi, TOR switchide ja RDMA SAN seadmete kokkuühendamiseks, teaduskonna tasemel&lt;br /&gt;
#: eelduste kohaselt 32491 EUR&lt;br /&gt;
#: Mellanox MSN2100-CB2R [[http://www.mellanox.com/related-docs/prod_eth_switches/PB_SN2100.pdf specs]] [[https://store.mellanox.com/products/mellanox-msn2100-cb2r-spectrum-100gbe-1u-open-ethernet-switch-with-mellanox-onyx-16-qsfp28-ports-2-ac-psus-x86-2core-short-depth-c2p-airflow-rohs6.html store]] á 15943+km&lt;br /&gt;
# kuus 25G võrgukaarti teaduskonna serveritele, teaduskonna tasemel, RDMA (RoCE v2) tehnoloogia kasutuselevõtuks ja infrastruktuuri arendamiseks&lt;br /&gt;
#: eelduste kohaselt 3260 EUR&lt;br /&gt;
#: Mellanox MCX512A-ADAT ConnectX-5 dual port [[http://www.mellanox.com/related-docs/prod_adapter_cards/PB_ConnectX-5_EN_Card.pdf specs]] [[https://store.mellanox.com/products/mellanox-mcx512a-adat-connectx-5-ex-en-network-interface-card-25gbe-dual-port-sfp28-pcie3-0-4-0-x8-tall-bracket.html store]] á 543+km&lt;br /&gt;
# kaks 100G võrgukaarti teaduskonna serveritele, teaduskonna tasemel, RDMA (RoCE v2) tehnoloogia kasutuselevõtuks ja infrastruktuuri arendamiseks&lt;br /&gt;
#: eeduste kohaselt 1714 EUR&lt;br /&gt;
#: Mellanox MCX516A-CCAT ConnectX-5 dual port [[http://www.mellanox.com/related-docs/prod_adapter_cards/PB_ConnectX-5_EN_Card.pdf specs]] [[https://store.mellanox.com/products/mellanox-mcx516a-ccat-connectx-5-en-network-interface-card-100gbe-dual-port-qsfp28-pcie3-0-x16-tall-bracket-rohs-r6.html store]] á 858+km&lt;br /&gt;
# DAC 25G/100G kaablid TOR switchide ja serverite ühendamiseks, 16tk 5m pikkused, ca 1050+km&lt;br /&gt;
#: FS.COM Mellanox certified DAC [[https://www.fs.com/de-en/products/65856.html 25G]] [[https://www.fs.com/de-en/products/72705.html 100G]]&lt;br /&gt;
# neli CWDM4 QSFP28 SMF LC 2km moodulit 100G side loomiseks ICT maja ja IT kolledzi vahele&lt;br /&gt;
#: eelduste kohaselt 1450 EUR&lt;br /&gt;
#: FS.COM Mellanox certified 100G CWDM4 QSFP28 [[https://www.fs.com/de-en/products/84374.html moodul]] [[https://www.fs.com/de-en/products/42718.html patch]]&lt;br /&gt;
# kuue arvutitöökoha uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna PC koos monitoride, monitoride lauakinnituse, hiire ja klaviatuuriga ~2k +km&lt;br /&gt;
# nelja laptopi uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna laptop ~1k +km&lt;br /&gt;
# litsentsi ja hooldusmaksud, kokku ~13.5k&lt;br /&gt;
#* EUROPRACTICE litsentside hooldusmaks ~9000 EUR&lt;br /&gt;
#* server ja klasside tarkvara hooldusmaks ~2500 EUR&lt;br /&gt;
#* server ja salvestusseadmete hooldusmaks ~2000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2021 kokku: 118869 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2022 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# salvestus(kõvaketta)massiivi väljavahetus, teaduskonna tasemel&lt;br /&gt;
#: praegune Storwize V3700 120TB mahus on alates jaanuarist 2018 EOL, support kestab kuni 5a peale EOL, mis on 2023 jaanuar&lt;br /&gt;
#: 2022 sügisperioodil tuleb vaadata uus salvestusmassiiv&lt;br /&gt;
#: orienteeruda tuleks IBM Storwize v5030 järgmise põlvkonna seadmele (pigem v5100)&lt;br /&gt;
#: uue kettakasti maht peaks olema vähemalt 2x praegusest mahust ehk 240TB&amp;lt;s&amp;gt;&lt;br /&gt;
#: FibreChannel SAN võrgu kiirus 32Gbps&amp;lt;/s&amp;gt;&lt;br /&gt;
#: 25G RoCE ühendus RDMA SAN switchi&lt;br /&gt;
#: uue kettakastikomplekti orienteeruv hind 85000 EUR&amp;lt;s&amp;gt;&lt;br /&gt;
# SAN võrgu uuendus, teaduskonna tasemel&lt;br /&gt;
#: tulenevalt uuest kettakastist on vajadus uuema põlvkonna kiirema SAN võrgu järele&lt;br /&gt;
#: 24port 32Gbps FC switchid - 2 tükki&lt;br /&gt;
#: orienteeruv hind 32000 EUR&amp;lt;/s&amp;gt;&lt;br /&gt;
# kuue arvutitöökoha uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna PC koos monitoride, monitoride lauakinnituse, hiire ja klaviatuuriga ~2k +km&lt;br /&gt;
# nelja laptopi uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna laptop ~1k +km&lt;br /&gt;
# litsentsi ja hooldusmaksud, kokku ~13.5k&lt;br /&gt;
#* EUROPRACTICE litsentside hooldusmaks ~9000 EUR&lt;br /&gt;
#* server ja klasside tarkvara hooldusmaks ~2500 EUR&lt;br /&gt;
#* server ja salvestusseadmete hooldusmaks ~2000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2022 kokku: 114500 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2023 ====&lt;br /&gt;
&lt;br /&gt;
# eriõppelaborite &amp;lt;s&amp;gt;arvutiklasside&amp;lt;/s&amp;gt; uuendamine, 3 klassi ICT maja 5. ja 3. korrusel&lt;br /&gt;
#* 5.k klassis 33 arvutitöökohta&lt;br /&gt;
#* 3.k klassides 30 arvutitöökohta&lt;br /&gt;
#*: kokku 63 arvutitöökohta&lt;br /&gt;
#*: ühe töökoha eeldatav maksumus 1450 EUR&lt;br /&gt;
#*: 63 arvutitöökoha eeldatav kogumaksumus 91350 EUR&lt;br /&gt;
# kuue arvutitöökoha uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna PC koos monitoride, monitoride lauakinnituse, hiire ja klaviatuuriga ~2k +km&lt;br /&gt;
# nelja laptopi uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna laptop ~1k +km&lt;br /&gt;
# litsentsi ja hooldusmaksud, kokku ~13.5k&lt;br /&gt;
#* EUROPRACTICE litsentside hooldusmaks ~9000 EUR&lt;br /&gt;
#* server ja klasside tarkvara hooldusmaks ~2500 EUR&lt;br /&gt;
#* server ja salvestusseadmete hooldusmaks ~2000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2023 kokku: 120850 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2024 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# salvestus(kõvaketta)massiivi laiendamine, teaduskonna tasemel&lt;br /&gt;
#: IBM Storwize v5100 laienduskast koos salvestusseadmetega, ca 26000 EUR&lt;br /&gt;
# kuue arvutitöökoha uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna PC koos monitoride, monitoride lauakinnituse, hiire ja klaviatuuriga ~2k +km&lt;br /&gt;
# nelja laptopi uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna laptop ~1k +km&lt;br /&gt;
# litsentsi ja hooldusmaksud, kokku ~13.5k&lt;br /&gt;
#* EUROPRACTICE litsentside hooldusmaks ~9000 EUR&lt;br /&gt;
#* server ja klasside tarkvara hooldusmaks ~2500 EUR&lt;br /&gt;
#* server ja salvestusseadmete hooldusmaks ~2000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2024 kokku: 55500 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2025 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# salvestus(kõvaketta)massiivi laiendamine, teaduskonna tasemel&lt;br /&gt;
#: IBM Storwize v5100 laienduskast koos salvestusseadmetega, ca 26000 EUR&lt;br /&gt;
# salvestus(kõvaketta)massiivi ostujärgse garantii pikendamine, teaduskonna tasemel&lt;br /&gt;
#: eelduste kohaselt ca 3000 EUR&lt;br /&gt;
# kuue arvutitöökoha uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna PC koos monitoride, monitoride lauakinnituse, hiire ja klaviatuuriga ~2k +km&lt;br /&gt;
# nelja laptopi uuendamine, instituudi tasemel&lt;br /&gt;
#* viimase põlvkonna laptop ~1k +km&lt;br /&gt;
# litsentsi ja hooldusmaksud, kokku ~13.5k&lt;br /&gt;
#* EUROPRACTICE litsentside hooldusmaks ~9000 EUR&lt;br /&gt;
#* server ja klasside tarkvara hooldusmaks ~2500 EUR&lt;br /&gt;
#* server ja salvestusseadmete hooldusmaks ~2000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2025 kokku: 58500 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2026 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# salvestus(kõvaketta)massiivi ostujärgse garantii pikendamine, teaduskonna tasemel&lt;br /&gt;
#: eelduste kohaselt ca 3000 EUR&lt;br /&gt;
# serverite uuendus&lt;br /&gt;
#: kolm serverit&lt;br /&gt;
#* kangem linux arvutusserver ca 40000 EUR&lt;br /&gt;
#* keskmine windows virtualiseerimisserver ca 30000 EUR&lt;br /&gt;
#* lahjem linux baasteenuste server ca 20000 EUR&lt;br /&gt;
#: kokku 90000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2026 kokku: 93000 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2027 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# viienda (5.) korruse suurte printerite vahetus, instituudi tasemel&lt;br /&gt;
#: eelduste kohaselt 7000+km&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2027 kokku: 7000 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2028 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# salvestus(kõvaketta)massiivi väljavahetus, teaduskonna tasemel&lt;br /&gt;
#: uue kettakastikomplekti orienteeruv hind 85000 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2028 kokku: 85000 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2029 ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# eriõppelaborite &amp;lt;s&amp;gt;arvutiklasside&amp;lt;/s&amp;gt; uuendamine, 3 klassi ICT maja 5. ja 3. korrusel&lt;br /&gt;
#* 5.k klassis 33 arvutitöökohta&lt;br /&gt;
#* 3.k klassides 30 arvutitöökohta&lt;br /&gt;
#*: kokku 63 arvutitöökohta&lt;br /&gt;
#*: ühe töökoha eeldatav maksumus 1450 EUR&lt;br /&gt;
#*: 63 arvutitöökoha eeldatav kogumaksumus 91350 EUR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2029 kokku: 91350 EUR&lt;br /&gt;
&lt;br /&gt;
==== 2030 ====&lt;br /&gt;
&lt;br /&gt;
==Korduvad iga-aastased kulutused==&lt;br /&gt;
&lt;br /&gt;
riist- ja tarkvara ning hoolduskulud, laptopid, tööjaamad, etc.&lt;br /&gt;
&lt;br /&gt;
* EUROPRACTICE litsentside hooldusmaks ~9000 EUR&lt;br /&gt;
* server ja klasside tarkvara hooldusmaks ~2500 EUR&lt;br /&gt;
* server ja salvestusseadmete hooldusmaks ~2000 EUR&lt;br /&gt;
&lt;br /&gt;
aastas kokku: 13500 EUR&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2892</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2892"/>
				<updated>2019-12-04T20:38:39Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* Decryption fail */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;float: none;&amp;quot;&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle;&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; line-height:1.6; text-align:left;&amp;quot;&amp;gt; SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents &amp;lt;/div&amp;gt;&lt;br /&gt;
|style=&amp;quot;text-align:right;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; font-style: italic; text-decoration:underline; text-align:right;&amp;quot;&amp;gt; click to expand &amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Decryption fail ===&lt;br /&gt;
&lt;br /&gt;
In reference to: https://medium.com/@6et/convert-openssh-rsa-key-to-a-pem-file-80753fdbac00&lt;br /&gt;
&lt;br /&gt;
When You see following error &amp;lt;code&amp;gt;unable to load Private Key&amp;lt;/code&amp;gt;...&amp;lt;code&amp;gt;Expecting: ANY PRIVATE KEY&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This means that Your private key is not in PEM format. To check if that is the case, You can view the contents of your &amp;lt;code&amp;gt;~/.ssh/id_rsa&amp;lt;/code&amp;gt; file and see if it starts with line&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN OPENSSH PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
Different versions of Secure Shell than You are currently using may have generated such keys. Secure Shell itself is able to handle different versions of private key formats as it converts/reads in them into suitable format for itself. Trouble lies with other utilities like &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; that can handle only specific/specified formats. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To convert Your private key into usable form, issue command&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-keygen -p -m PEM -f ~/.ssh/id_rsa&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After that Your private key should start with line&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
And now You can decrypt the message using &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility.&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2891</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2891"/>
				<updated>2019-12-04T20:37:58Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* Decryption fail */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC0slKFeI2QKDbele2YNbbsQnIuIr070sAAcK3lazDRNEfSAVqcevAoUoTFRe7BRKjeTzj74q8XGfH6/OciiVGpvF9La/a8apXB0x4qYdCA+S/pZJGbl8MLRMMuaU+7sUSd0wEhru5H8LXilpRjNBht+In4+CJKEOWb3TJ2gAPHp8hACdCpyKUNz6g+hcE8Vkx/JoMXDqhyGGr2qVcVTDxZ/Y506LyOMwarnzdz7JYLBq8LPOiHI6BNIUSnC8HixQ9DnJev44ZVJcoKLLM/kn7GNVczZ+L8xKC5i5GB+rAWPy4unQqqB9pAwKUjZ3WRRPFH8TcRprjiHlsZjeW27nAPeIu+jE0fQWKSWMdGt1CTYJuOGf7zOFCHupHC6S6EKqVUtni3GuiM+NQHukGAk95DWGydVY6OSTJP0a5/4akS/KmpOZ20WTer1BV171DZI3X8P35vwJIaP9Aamg4pDhQUSXSn1f9YD5lgXmhhgFVcyjo+ox6Q2VuVNX/eLW7WxtfmDBYCHbJEzIb3nHH2CWb47YyA+pYbku4WjFDTRc7blgsnCjCMGHPHXyP8TLLWB6ZiLYwAvucK78rljkTXwPALllktMG9YN215CRJGqZcWaCiVspWJvSwpMF8nJR842IpgkGFtlcMoPFoPwuv8yMUa+3bu2T3nwULOmZCsEBJiXQ== user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;float: none;&amp;quot;&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle;&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; line-height:1.6; text-align:left;&amp;quot;&amp;gt; SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents &amp;lt;/div&amp;gt;&lt;br /&gt;
|style=&amp;quot;text-align:right;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; font-style: italic; text-decoration:underline; text-align:right;&amp;quot;&amp;gt; click to expand &amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Decryption fail ===&lt;br /&gt;
&lt;br /&gt;
In reference to: https://medium.com/@6et/convert-openssh-rsa-key-to-a-pem-file-80753fdbac00&lt;br /&gt;
&lt;br /&gt;
When You see following error &amp;lt;code&amp;gt;unable to load Private Key&amp;lt;/code&amp;gt;...&amp;lt;code&amp;gt;Expecting: ANY PRIVATE KEY&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This means that Your private key is not in PEM format. To check if that is the case, You can view the contents of your &amp;lt;code&amp;gt;~/.ssh/id_rsa&amp;lt;/code&amp;gt; file and see if it starts with line&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN OPENSSH PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
Older/different versions of Secure Shell than You are currently using may have generated such keys. Secure Shell itself is able to handle different versions of private key formats as it converts/reads in them into suitable format for itself. Trouble lies with other utilities like &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; that can handle only specific/specified formats. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To convert Your private key into usable form, issue command&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-keygen -p -m PEM -f ~/.ssh/id_rsa&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After that Your private key should start with line&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
And now You can decrypt the message using &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility.&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2890</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2890"/>
				<updated>2019-12-04T20:27:40Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;float: none;&amp;quot;&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle;&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; line-height:1.6; text-align:left;&amp;quot;&amp;gt; SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents &amp;lt;/div&amp;gt;&lt;br /&gt;
|style=&amp;quot;text-align:right;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; font-style: italic; text-decoration:underline; text-align:right;&amp;quot;&amp;gt; click to expand &amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Decryption fail ===&lt;br /&gt;
&lt;br /&gt;
In reference to: https://medium.com/@6et/convert-openssh-rsa-key-to-a-pem-file-80753fdbac00&lt;br /&gt;
&lt;br /&gt;
When You see following error &amp;lt;code&amp;gt;unable to load Private Key&amp;lt;/code&amp;gt; + &amp;lt;code&amp;gt;Expecting: ANY PRIVATE KEY&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This means that Your private key is not in PEM format. To check if that is the case, You can view the contents of your &amp;lt;code&amp;gt;~/.ssh/id_rsa&amp;lt;/code&amp;gt; file and see if it starts with line&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN OPENSSH PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To convert Your private key into usable form, issue command&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-keygen -p -m PEM -f ~/.ssh/id_rsa&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After that Your private key should start with line&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
And now You can decrypt the message using &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility.&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2889</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2889"/>
				<updated>2019-12-04T20:19:49Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC0slKFeI2QKDbele2YNbbsQnIuIr070sAAcK3lazDRNEfSAVqcevAoUoTFRe7BRKjeTzj74q8XGfH6/OciiVGpvF9La/a8apXB0x4qYdCA+S/pZJGbl8MLRMMuaU+7sUSd0wEhru5H8LXilpRjNBht+In4+CJKEOWb3TJ2gAPHp8hACdCpyKUNz6g+hcE8Vkx/JoMXDqhyGGr2qVcVTDxZ/Y506LyOMwarnzdz7JYLBq8LPOiHI6BNIUSnC8HixQ9DnJev44ZVJcoKLLM/kn7GNVczZ+L8xKC5i5GB+rAWPy4unQqqB9pAwKUjZ3WRRPFH8TcRprjiHlsZjeW27nAPeIu+jE0fQWKSWMdGt1CTYJuOGf7zOFCHupHC6S6EKqVUtni3GuiM+NQHukGAk95DWGydVY6OSTJP0a5/4akS/KmpOZ20WTer1BV171DZI3X8P35vwJIaP9Aamg4pDhQUSXSn1f9YD5lgXmhhgFVcyjo+ox6Q2VuVNX/eLW7WxtfmDBYCHbJEzIb3nHH2CWb47YyA+pYbku4WjFDTRc7blgsnCjCMGHPHXyP8TLLWB6ZiLYwAvucK78rljkTXwPALllktMG9YN215CRJGqZcWaCiVspWJvSwpMF8nJR842IpgkGFtlcMoPFoPwuv8yMUa+3bu2T3nwULOmZCsEBJiXQ== user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;float: none;&amp;quot;&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle;&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; line-height:1.6; text-align:left;&amp;quot;&amp;gt; SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents &amp;lt;/div&amp;gt;&lt;br /&gt;
|style=&amp;quot;text-align:right;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; font-style: italic; text-decoration:underline; text-align:right;&amp;quot;&amp;gt; click to expand &amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Decryption fail ===&lt;br /&gt;
&lt;br /&gt;
In reference to: https://medium.com/@6et/convert-openssh-rsa-key-to-a-pem-file-80753fdbac00&lt;br /&gt;
&lt;br /&gt;
When You see following error &amp;lt;code&amp;gt;unable to load Private Key&amp;lt;/code&amp;gt; + &amp;lt;code&amp;gt;Expecting: ANY PRIVATE KEY&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This means that Your private key is not in PEM format. To check if that is the case, You can view the contents of your &amp;lt;code&amp;gt;~/.ssh/id_rsa&amp;lt;/code&amp;gt; file and see if it starts with line&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN OPENSSH PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2888</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2888"/>
				<updated>2019-12-04T15:49:23Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* The keys */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;float: none;&amp;quot;&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle;&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; line-height:1.6; text-align:left;&amp;quot;&amp;gt; SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents &amp;lt;/div&amp;gt;&lt;br /&gt;
|style=&amp;quot;text-align:right;&amp;quot;| &amp;lt;div style=&amp;quot;font-weight:bold; font-style: italic; text-decoration:underline; text-align:right;&amp;quot;&amp;gt; click to expand &amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2887</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2887"/>
				<updated>2019-12-04T15:36:36Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* The keys */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;float: none;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-weight:bold;line-height:1.6;&amp;quot;&amp;gt;SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2886</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2886"/>
				<updated>2019-12-04T15:35:35Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: /* The keys */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;float: none;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-weight:bold;line-height:1.6;&amp;quot;&amp;gt;SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content mw-collapsed&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2885</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2885"/>
				<updated>2019-12-04T15:33:39Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-toggle toccolours&amp;quot; style=&amp;quot;width:540px; float: none;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-weight:bold;line-height:1.6;&amp;quot;&amp;gt;SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2884</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2884"/>
				<updated>2019-12-04T15:19:56Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours mw-collapsible mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-weight:bold;line-height:1.6;&amp;quot;&amp;gt;SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	<entry>
		<id>https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2883</id>
		<title>SSH encrypt and decrypt</title>
		<link rel="alternate" type="text/html" href="https://strudel.pld.ttu.ee/wiki/e/index.php?title=SSH_encrypt_and_decrypt&amp;diff=2883"/>
				<updated>2019-12-04T15:17:11Z</updated>
		
		<summary type="html">&lt;p&gt;Marek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
Tutorial on how to encrypt and decrypt small messages using Secure Shell keys&lt;br /&gt;
&lt;br /&gt;
== Why? ==&lt;br /&gt;
For example,&amp;lt;br&amp;gt;&lt;br /&gt;
when You have to send someone a password and sending it over internet in plaintext is out of the question.&lt;br /&gt;
&lt;br /&gt;
== How to send Yourself a secret message (tutorial) ==&lt;br /&gt;
&lt;br /&gt;
=== The keys ===&lt;br /&gt;
&lt;br /&gt;
Everyone who uses Secure Shell (SSH) has an easy access to accompanying Secure Shell keys. When You do not have them, then You generate them.&lt;br /&gt;
&lt;br /&gt;
All it takes is Linux, MacOS command line or Cygwin shell in Windows. A minute or two of Your time and few sips of tea. Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One can make simple passwordless RSA key-pair with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -t rsa -b 4096&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/user/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /home/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:seDs6vDo55WegAZnG/mr8S+sgz2kvJFCc1wAGsHyB2c user@linux&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+---[RSA 4096]----+&lt;br /&gt;
|+o..             |&lt;br /&gt;
|oo. E            |&lt;br /&gt;
|o. + .. .        |&lt;br /&gt;
|  o.oo . o       |&lt;br /&gt;
|.o=+  o S        |&lt;br /&gt;
|.+== . .         |&lt;br /&gt;
|oB*.o +          |&lt;br /&gt;
|+o=*+* .         |&lt;br /&gt;
| o*OBo+          |&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The process above creates 2 files &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; and places them into subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; relative to Your home directory.&lt;br /&gt;
&lt;br /&gt;
The contents of the public key &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@linux&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the contents of the private key &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; should be like this:&lt;br /&gt;
&amp;lt;div class=&amp;quot;toccolours mw-collapsible mw-collapsed&amp;quot; style=&amp;quot;width:540px; overflow:auto;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-weight:bold;line-height:1.6;&amp;quot;&amp;gt;SSH private key, file &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; contents&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;mw-collapsible-content&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN RSA PRIVATE KEY-----&lt;br /&gt;
MIIJKQIBAAKCAgEAu5Z/XRKcm5pxUMTcAHM643DqdvheWVDTwsG5R3RAF18HN7kt&lt;br /&gt;
P/WLgk3bJy3gMTEetczE5uEV6ukY2ZgrPyOqAfORjB5cRfzy4TsRCqJ0eljY4PEo&lt;br /&gt;
A54gJFCzlOBiQwL8pL1KHwMQGyer54++VTVay8+te9AXWkX6K9aRWM+FVuUPAjnX&lt;br /&gt;
RZ6OpDmcJ+AXn2e3LEIENgs4gTnHGxwCYYuHkRivWFj2C8fIOgMoYjX7eUO68151&lt;br /&gt;
jgLlsRQEvpedYA2xTSQ9gP/UTTSbxJWrUjkDHr7Qyq3JKudU/cjeYDN9ZXgxwuJz&lt;br /&gt;
777jMgfnoAQgAdywtLKEqY8Be5z9zYmfU7C4AgXBbacDDmcRfjgHHIbIwYTo411A&lt;br /&gt;
22HvMzl+af0NTb1ALk5vCpb8hVdWozNb0eAnPa3L9UGvcu/rko59E0UA0pJ3CtNA&lt;br /&gt;
Xo/ZX7OLucrdehAmUQtD97bMrEFr+pP21t8r2XqvNfH6EparArL9cVXbGuVvkpRz&lt;br /&gt;
xnXhJmHFogOlHLPXOnF9pkFj7HL0ScYqkhll8niDLG3+AyjCcEQ0vmIuRpMONfa5&lt;br /&gt;
K8sH9XQLY4yKFbZzWcpIUUeSkSWkAfo7os7e+D4+xUcTLAUXaZsvs9QaNnMKZU+A&lt;br /&gt;
5FSd5uv8H/Ku+ejX03G1CGDV9nJYzA0Ysc/UPy08j3eSrFZCqJN2Kci76gUCAwEA&lt;br /&gt;
AQKCAgAE7c1m6qhGxmYX0zRcpqpzc3IVsiz4d9E4mtJ9eCZ+9rY/1pPDzHXf9J+/&lt;br /&gt;
hcsQP9QovrqlvmBPDdTjUsZAIHXFG1tFrT6LcDwJgv3No7sfw9ne/zcn8S2zBpPR&lt;br /&gt;
Y5vxWtC8m2SpL/FqZT51FSfRIVfDZy+Nw0f5zUDnifnDtaAxSk98pXxsjd/9nK3n&lt;br /&gt;
tlGolJcRiKKHsP/JFXWP1sqROZNUUqu4zI2afaNbMt4KxpRW+VqeLms0Ugsq/fWp&lt;br /&gt;
9F3kOjfgaQVcsFwpsyosniokPO9CDY165doVUILBMFf3eyLeWawlDMIzGHbrx51k&lt;br /&gt;
bPdSVTQna1FlCybk0pkwn18aWdhb2bpTympeXRRqH2nYBptHZPSLNDkyg3pMVYg/&lt;br /&gt;
IlSjM1yTri2D4MJ/wsc40UMag9ntfBlyPou1fZNMJtfDR0EchvOrYYVE8Q6wsTr6&lt;br /&gt;
WfHy1KrsRr9WPkJ3xC65GJLnxXBzRx/btDWeDX0DQuWHzM/YeI8vDZrCj5q4wSDs&lt;br /&gt;
2xbt3syLum8OUMTPXsahrL1yUXAC+YBayh7BSeTSNsngLN+Hmvn/aCBX+191H/9g&lt;br /&gt;
JQhtKBjjGdSUz2NTOQSB1PKFrIhMW+xz09S/fOC86tVnxYr2q6BtBWQOy3m/oN09&lt;br /&gt;
cbzATIgCSFyRvadocT0UmhevWJQ9gCof7wSW2wJbgCCH/pd5gQKCAQEA3tjuS6UH&lt;br /&gt;
M61gs8vH2vCE/LnMRoH5AnDUPecl7AWszMPzMH1Rm7JvN2ao0IOk+Az9p4j9QhP0&lt;br /&gt;
kCug9mfPjtjSWePmrCamXbCuSEoUWTyVxf/ZD1rspS57QMHpl/OZUc4qfM/NdXFD&lt;br /&gt;
Eh724fw8Cu1qJz8Xr0pU+3XpRfw8X3vUrvlkkc9GCv1hg2YnBLHz/LdRvyLpa4IZ&lt;br /&gt;
6dNXaqjP7lWID5ylT/Tq6WQyIDhrHr9y0g5/F7WqUtd63VeJl97IUs98Qt9l6NKj&lt;br /&gt;
0fDbUJVlhF2QUMbu+zqwAJGoh+JBr9GadvStcbvFuSTtwCBHeAfE8tZ/7ZNadXVL&lt;br /&gt;
m8lrSH7gSN4GFQKCAQEA1364VWWkkdNvTreyj2eMeoQaPtNKVnP+FC7N8PPG/2KB&lt;br /&gt;
eL/DWORSlwUmBX62bYmMuzJEacK8UyUTd/v5OmjZ2y8wdrAZX7R5iHGUD8NEPDZi&lt;br /&gt;
U/okGrq7KeuV/rA8A6t6IWIcEBw/JiKuK96dToySDtEYXLc+lLDCoaHayVv7WT77&lt;br /&gt;
yUPSHY4RF7G/ipiSYoFfYlvCMh/TveCDDdz1eiJpGtfKBHZWVMoLXKtnka704IWt&lt;br /&gt;
/dghwd4Uvqz5zaVPLZHhCmppI0uia5wH9mkoHMjOx7ZuoDrg2SuYsBaNPhQTb3aA&lt;br /&gt;
oUvnC2xWM+1RRHKIU6/VyRUfbkPAhycZ1rSq2znAMQKCAQEA21vQXbfJug29dd5v&lt;br /&gt;
EU3Wqms98F26PrPPyEuDIayIZ1uvRBjnvwpKvc8Y93/OYLlw6nxHR8ca4tt/a23O&lt;br /&gt;
ev9lOETE6Mp20xy6wb/h/eFMUQXCpYHMFeEGRD1c8k1Aq6z0V725shRWgDzoqpS+&lt;br /&gt;
iccfyhgp+UuDEbAEevaKezcKqV4mp/zPJrw6Q7zHRbDhye6t0ibMfB4p4eg+UWhw&lt;br /&gt;
nVumPi/k7irZHfqZ+OtwTmkH3kuUwUL6sOcZM04ay9rpd9Jzr+P1jdPinCKpz83v&lt;br /&gt;
ivcKuujHj5c6bqTyryeBn08E7Hl3TdAXFmOKgKeFklqbfKq2bKay0ZIvZd9D8q2p&lt;br /&gt;
mzCp7QKCAQA3dFu5ViPIhxGQv0MLFkmXSaF7Y2Iw5z6OMRE8HW+rTs0kpqx9lpwO&lt;br /&gt;
Uvva1CXcAFaf4aqrULqn5tWgvc4AEvVlKzqcgGq3LzlLPHcuq0BHAnPBSpC59C2v&lt;br /&gt;
9vkthmqbQyh1qMqx9qLljG0nyuzORuxbNcHAMkO/fdFISN+Fi88dw1CGFZbfliyd&lt;br /&gt;
3Vb+Mo8RHFvQcu6BeaFCrqDrE150ZKCJkNhi15UV0ryjx1QqsExB7wS8Wz8spZrP&lt;br /&gt;
CrJqEk1S28R+qq2NsKwGZyvBZIQ3DBHyYOcNArnUCR0My3DjdcUenO8zEtZNIT75&lt;br /&gt;
s+uC4rpkVs58JZxmArdr0Esc7nc9XRoxAoIBAQCjE2+VQOtWWV+6ab3TlsZ0nWM7&lt;br /&gt;
kKTcWlz0WixKAfGzkYtypW3qlli3M8JqDGPw4M5o4VR1c5gjj0hIr37ywBi9PtrM&lt;br /&gt;
nkz3iRI8sTyTWqfns/NfQiJrSCWMvTOChxDskm7gxn6cz2/OcmsqUINjQdm+mqiE&lt;br /&gt;
cd/4Awso2itT0NUkhoZSRon5cwOCqJg8DukLBdXrmWDmDqJDulzAZTZlbAMxeSn4&lt;br /&gt;
M1Vrc7QD6jtNBxlJsvDolatOccZv9dVCLUIUUkkTN41uIq96F+4mxW63SqTW0MaT&lt;br /&gt;
PGN9FPjRVXSuyyDrVyua7Z3R4wqy1RFc7XMaXxg5qaqhiZbXkBU444NkU0jg&lt;br /&gt;
-----END RSA PRIVATE KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To encrypt ===&lt;br /&gt;
&lt;br /&gt;
Now You have Your pair of keys, the public one &amp;lt;code&amp;gt;id_rsa.pub&amp;lt;/code&amp;gt; is used to encrypt and the private one &amp;lt;code&amp;gt;id_rsa&amp;lt;/code&amp;gt; to decrypt a message.&lt;br /&gt;
&lt;br /&gt;
==== Create the message ====&lt;br /&gt;
&lt;br /&gt;
Take Your favorite text editor and create short text file &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; with some content like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Prepare Your public key for encryption ====&lt;br /&gt;
&lt;br /&gt;
One drawback or discouraging step for encryption is that Your public key is not usable '''''as is'''''.&lt;br /&gt;
&lt;br /&gt;
To be usable with &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility it has to be in PKCS8 format.&lt;br /&gt;
&lt;br /&gt;
Public key can be converted to PKCS8 format with &amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f ~/.ssh/id_rsa.pub -e -m pkcs8 &amp;gt; id_rsa_pub.pkcs8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The contents of such converted key should be like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PUBLIC KEY-----&lt;br /&gt;
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtLJShXiNkCg23pXtmDW2&lt;br /&gt;
7EJyLiK9O9LAAHCt5Wsw0TRH0gFanHrwKFKExUXuwUSo3k84++KvFxnx+vznIolR&lt;br /&gt;
qbxfS2v2vGqVwdMeKmHQgPkv6WSRm5fDC0TDLmlPu7FEndMBIa7uR/C14paUYzQY&lt;br /&gt;
bfiJ+PgiShDlm90ydoADx6fIQAnQqcilDc+oPoXBPFZMfyaDFw6ochhq9qlXFUw8&lt;br /&gt;
Wf2OdOi8jjMGq583c+yWCwavCzzohyOgTSFEpwvB4sUPQ5yXr+OGVSXKCiyzP5J+&lt;br /&gt;
xjVXM2fi/MSguYuRgfqwFj8uLp0KqgfaQMClI2d1kUTxR/E3Eaa44h5bGY3ltu5w&lt;br /&gt;
D3iLvoxNH0FikljHRrdQk2Cbjhn+8zhQh7qRwukuhCqlVLZ4txrojPjUB7pBgJPe&lt;br /&gt;
Q1hsnVWOjkkyT9Guf+GpEvypqTmdtFk3q9QVde9Q2SN1/D9+b8CSGj/QGpoOKQ4U&lt;br /&gt;
FEl0p9X/WA+ZYF5oYYBVXMo6PqMekNlblTV/3i1u1sbX5gwWAh2yRMyG95xx9glm&lt;br /&gt;
+O2MgPqWG5LuFoxQ00XO25YLJwowjBhzx18j/Eyy1gemYi2MAL7nCu/K5Y5E18Dw&lt;br /&gt;
C5ZZLTBvWDdteQkSRqmXFmgolbKVib0sKTBfJyUfONiKYJBhbZXDKDxaD8Lr/MjF&lt;br /&gt;
Gvt27tk958FCzpmQrBASYl0CAwEAAQ==&lt;br /&gt;
-----END PUBLIC KEY-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Encrypt the message ====&lt;br /&gt;
&lt;br /&gt;
Now You can encrypt Your super secret message with converted public key like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey id_rsa_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example we pipe the contents of &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt; file to &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility that uses converted public key &amp;lt;code&amp;gt;id_rsa_pub.pkcs8&amp;lt;/code&amp;gt; and then we store the output in file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== To decrypt ===&lt;br /&gt;
&lt;br /&gt;
To decrypt the encrypted message file &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; we use &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In above example the contents of decrypted message are show in startard output.&lt;br /&gt;
&lt;br /&gt;
To save decrypted contents one can modify the command like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa &amp;gt; message.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Real world ==&lt;br /&gt;
&lt;br /&gt;
In real world, when You have to pass someone sensitive small message, like a password&lt;br /&gt;
# You ask that someone to send You their public key&lt;br /&gt;
#* If that public key is not already in PKCS8 format then You convert it&lt;br /&gt;
# You encrypt Your message with that someone's public key that is in PKCS8 format&lt;br /&gt;
# You send the encrypted message to that someone&lt;br /&gt;
# That someone decrypts Your message with their private key&lt;br /&gt;
Contrary to tutorial above Your SSH keys are not needed when You are sending an encrypted message. You only need the other persons public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
When someone sends You their public key, save it to a file &amp;lt;code&amp;gt;someone.pub&amp;lt;/code&amp;gt;. Create Your secret message &amp;lt;code&amp;gt;message.txt&amp;lt;/code&amp;gt;. Then do following, firstly to convert the key and secondly to encrypt Your message:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -f someone.pub -e -m pkcs8 &amp;gt; someone_pub.pkcs8&lt;br /&gt;
linux:/home/user&amp;gt; cat message.txt | openssl rsautl -encrypt -pubin -inkey someone_pub.pkcs8 &amp;gt; message.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And send the output &amp;lt;code&amp;gt;message.enc&amp;lt;/code&amp;gt; as a file to that someone. &lt;br /&gt;
&lt;br /&gt;
That person then does following and reads the message content from standard output:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/someone&amp;gt; cat message.enc | openssl rsautl -decrypt -inkey ~/.ssh/id_rsa&lt;br /&gt;
This is very serious short message.&lt;br /&gt;
That will be encrypted.&lt;br /&gt;
And decrypted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
=== Message size ===&lt;br /&gt;
&lt;br /&gt;
This encryption / decryption method is suitable for small messages, messages whose bitlength is smaller than used RSA key length.&lt;br /&gt;
&lt;br /&gt;
If You want to encrypt longer messages or some big file(s) then the above method can be used for passing on encrypted passwords that are used for file encryption/decryption.&lt;br /&gt;
&lt;br /&gt;
One should use CBC (Cipher Block Chaining) continuous block cipher like AES256 for big file encryption / decryption. &amp;lt;code&amp;gt;openssl&amp;lt;/code&amp;gt; utility is able to do that too.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl enc -aes256 -kfile message.txt -in file -out file.enc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What the path? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;~&amp;lt;/code&amp;gt; denotes users home directory, in essence its a shortcut for &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then &amp;lt;code&amp;gt;~/.ssh&amp;lt;/code&amp;gt; means subfolder &amp;lt;code&amp;gt;.ssh&amp;lt;/code&amp;gt; that resides in users home directory &amp;lt;code&amp;gt;/home/user&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using full path the above would be &amp;lt;code&amp;gt;/home/user/.ssh&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Private stuff ===&lt;br /&gt;
&lt;br /&gt;
Your key pair that You generated is Your sensitive security information.&lt;br /&gt;
&lt;br /&gt;
Your public key can be passed on to persons/organizations You know, to authenticate You as a sign-on method (go see Gitlab), or it can be used as in above tutorial to encrypt messages. Being &amp;quot;public&amp;quot; does not mean You should openly advertise the contents of that key. It is theoretically possible to re-create private key based on public key, that process takes massive amounts of supercomputer time and is exponentially difficult based on key length. The longer the key the better. There is a tradeoff - longer keys work slower. In above tutorial we used 4096 bit keys that are quite okay by todays (2019) standards.&lt;br /&gt;
&lt;br /&gt;
Your private key should never be shown or given out to anyone. The best practice is to encrypt Your private key with a password.&lt;br /&gt;
&amp;lt;code&amp;gt;ssh-keygen&amp;lt;/code&amp;gt; utility is able to do that like this:&amp;lt;pre&amp;gt;&lt;br /&gt;
linux:/home/user&amp;gt; ssh-keygen -p -f ~/.ssh/id_rsa&lt;br /&gt;
Enter new passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved with the new passphrase.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When You lose your private key, then all is lost. Unless You work for NSA and have supercomputer farm at hand. So keep it safe and secure.&lt;br /&gt;
&lt;br /&gt;
=== Martian messages ===&lt;br /&gt;
&lt;br /&gt;
Obviously encrypted messages are not human readable. If You made a mistake of looking the contents and Your command line went gibberish, issue following command by blindly typing: &amp;lt;code&amp;gt;reset&amp;lt;/code&amp;gt;. This resets the terminal and You should see normal command line again.&lt;/div&gt;</summary>
		<author><name>Marek</name></author>	</entry>

	</feed>