espero entonces tu modulo, que me he informado y me parece uno de los mejores cripters! 
Luego creo el modulo y lo subo.
wifislax Tomb-1.5.3 # tomb dig -s 100 secrets.tomb -f
tomb . Commanded to dig tomb secrets.tomb
tomb (*) Creating a new tomb in ./secrets.tomb
tomb . Generating secrets.tomb of 100MiB
100+0 registros leídos
100+0 registros escritos
104857600 bytes (105 MB) copiados, 40,5855 s, 2,6 MB/s
tomb . -rw------- 1 root root 100M oct 29 13:48 ./secrets.tomb
tomb (*) Done digging secrets
tomb . Your tomb is not yet ready, you need to forge a key and lock it:
tomb . tomb forge secrets.tomb.key
tomb . tomb lock secrets.tomb -k secrets.tomb.key
wifislax Tomb-1.5.3 # tomb forge -k secrets.tomb.key -f
tomb . Commanded to forge key secrets.tomb.key
tomb . Commanded to forge key secrets.tomb.key with cipher algorithm AES256
tomb . This operation takes time, keep using this computer on other tasks,
tomb . once done you will be asked to choose a password for your tomb.
tomb . To make it faster you can move the mouse around.
tomb . If you are on a server, you can use an Entropy Generation Daemon.
256+0 registros leídos
256+0 registros escritos
256 bytes (256 B) copiados, 135,329 s, 0,0 kB/s
tomb (*) Choose the password of your key: secrets.tomb.key
tomb . (You can also change it later using 'tomb passwd'.)
[GNUPG:] NEED_PASSPHRASE_SYM 9 3 2
[GNUPG:] BEGIN_ENCRYPTION 2 9
[GNUPG:] END_ENCRYPTION
tomb . Valid key file found: secrets.tomb.key
tomb . Done forging secrets.tomb.key
tomb (*) Your key is ready:
-rw------- 1 root root 539 oct 29 13:52 secrets.tomb.key
wifislax Tomb-1.5.3 # tomb lock -k secrets.tomb.key secrets.tomb
tomb . Commanded to lock tomb
tomb . Checking if the tomb is empty (we never step on somebody else's bones).
tomb . Fine, this tomb seems empty.
tomb . Valid key file found: ./secrets.tomb.key
tomb . Locking using cipher: aes-xts-plain64:sha256
tomb . A password is required to use key secrets.tomb.key
tomb . Password OK.
tomb (*) Locking secrets.tomb with ./secrets.tomb.key
tomb . Formatting Luks mapped device.
tomb . Formatting your Tomb with Ext3/Ext4 filesystem.
tomb . Done locking secrets using Luks dm-crypt
tomb (*) Your tomb is ready in ./secrets.tomb and secured with key ./secrets.tomb.key
wifislax Tomb-1.5.3 # Salu2