1. Confidentiality - Data (Files or e-mail) are encrypted
2. Integrity - Digital signatures
3. Compression
4. Public Key Infrastructure (PKI)
a. Public key - used to encrypt data to a recipient
b. Private key - used to decrypt data from a sender
5. GPG is OpenPGP compliant
Usage:
1. gpg --list-keys - this enumerates keys in ~/
2. gpg --gen-key - generates a PKI keypair for the current user
3. gpg --encrypt -r LinuxCBT --armor sample.txt - encrypts sample.txt using our 'LinuxCBT's' public key
4. gpg --decrypt sample.txt.asc
5. gpg --decrypt sample.txt.gpg
6. gpg --export -a - dumps public key to STDOUT
7. gpg --import - waits on STDIN for user to paste a key for import
8. gpg --decrypt -o sample.txt sample.txt.gpg
No comments:
Post a Comment