Lots of people “run Linux” without really knowing or caring – many home routers, navigational aids, webcams and other IoT devices are based on it; the majority of the world’s mobile phones run a Linux-derived variant called Android; and many, if not ...
To handle cryptography, the Linux kernel has its own API enabling common methods of encryption, decryption and your favourite hash functions! Learn about the use of hash functions and symmetric key encryption in the Linux kernel in the Linux Kernel Module Programming Guide.