Cryptsetup

lsblk -o NAME,MODEL,RM,SIZE,TYPE,MOUNTPOINTS
sudo cryptsetup luksFormat /dev/sdb
## Enter passphrase for /dev/sdb:
sudo cryptsetup luksOpen /dev/sdb storage_crypt
## Enter passphrase for /dev/sdb:
sudo mkfs.ext4 /dev/mapper/storage_crypt
## ...
## Allocating group tables: done
## Writing inode tables: done
## Creating journal (131072 blocks): done
## Writing superblocks and filesystem accounting information: done
sudo mkdir -p /mnt/storage
sudo mount /dev/mapper/storage_crypt /mnt/storage
sudo blkid /dev/sdb
## /dev/sdb: UUID="12345678-90ab-cdef-1234-567890abcdef" TYPE="crypto_LUKS"
sudo vi /etc/crypttab
## storage_crypt UUID=12345678-90ab-cdef-1234-567890abcdef none luks,discard
sudo vi /etc/fstab
## /dev/mapper/storage_crypt /mnt/storage ext4 defaults,nofail 0 2
sudo mkdir -p /etc/keys
sudo chmod 700 /etc/keys
sudo dd if=/dev/urandom of=/etc/keys/storage_crypt.key bs=4096 count=1
sudo chmod 400 /etc/keys/storage_crypt.key
sudo cryptsetup luksAddKey /dev/sdb /etc/keys/storage_crypt.key
## Enter any existing passphrase:
sudo vi /etc/crypttab
## storage_crypt UUID=12345678-90ab-cdef-1234-567890abcdef /etc/keys/storage_crypt.key luks,discard
sudo cryptsetup luksFormat -c aes-cbc-essiv:sha256 -s 256 /dev/sdb2
sudo cryptsetup luksOpen /dev/sdb2 luks
sudo mkfs.ext4 -L ENCRYPTED /dev/mapper/luks
sudo mount /dev/mapper/luks /mnt/secure
sudo cryptsetup luksOpen /dev/sdb2 luks
sudo mount /dev/mapper/luks /mnt/secure
sudo umount /mnt/secure
sudo cryptsetup luksClose luks

Daiphys is a professional services company in research and development of leading-edge technologies in science and engineering.
Get started accelerating your business through our deep expertise in R&D with AI, quantum computing, and space development; please get in touch with Daiphys today!

Name*


Email*


Subject


Message*




* Indicates required field

Daiphys Technologies LLC - https://www.daiphys.com/

  • Last modified: 2026/04/21 08:41
  • by Daiphys