GPG is GNU Privacy Guard, a non-commercial version of the encryption tool PGP (pretty good privacy). It is used to encrypt and verify the sending and receiving of emails, files, and other data, ensure the reliability and authenticity of communication data.
GPG (GnuPG) 1.4.2
Copyright (c) 2005 Free Software Foundation, Inc.
This program comes with absolutely no warranty.
This is free software, and you are welcome to redistribute it
Under certain conditions. See the file copying for details.
Home: C:/Documents and Settings/Administrator/Application Data/GnuPG
Supported algorithms:
Public Keys: RSA, RSA-E, RSA-S, ELG-E, DSA
Symmetric encryption: 3DES, cast5, blowfish, AES, aes192, aes256, twofish
Hash: MD5, sha1, ripemd160, sha256, sha384, sha512
Compression: no compression, zip, zlib, Bzip2
Syntax: GPG [Option] [file name]
Sign, check, encrypt or decrypt
The default operation depends on the input data.
Command:
-S, -- sign [file name] to generate a signature
-- Clearsign [file name] generates a plaintext Signature
-B, -- detach-sign to generate a separate Signature
-E, -- encrypt: encrypt data
-C, -- encryption Ric only uses symmetric encryption
-D, -- decrypt data (default)
-- Verify verification signature
-- List-keys
-- List-Sigs: List keys and signatures
-- Check-Sigs: List and check the Key signature
-- Fingerprint: List keys and fingerprints
-K, -- list-secret-keys to list private keys
-- Gen-key generates a new pair of key pairs
-- Delete-keys: Delete the key from the Public Key Ring
-- Delete-secret-keys: Delete the key from the key ring of the private key.
-- Sign-key: Add a signature for a key
-- Lsign-key: Add a local signature for a key
-- Edit-key: edit a key or add a signature for it
-- Gen-Revoke generates a revocation Certificate
-- Export
-- Send-keys: exports the key to a public key server.
-- Recv-keys import the key from the Public Key Server
-- Search-keys: Search for keys on the Public Key Server
-- Refresh-keys update all local keys from the Public Key Server
-- Import/merge keys
-- Card-status print card status
-- Card-Edit: change the data on the card
-- Change-pin: Change the card's pin
-- Update-trustdb update trust Database
-- Print-MD algorithm [file] use the specified hash algorithm to print the message hash value
Option:
-A, -- armor output is encapsulated in ASCII
-R, -- recipient. A Class A is encrypted for the recipient "Class ".
-U, -- local-user use this user ID to sign or decrypt
-Z n: Set the compression level to n (0 indicates no compression)
-- Textmode uses the standard text mode
-O, -- output specifies the output file
-V, -- verbose detailed mode
-N, -- dry-run is not changed
-I, -- ask before interactive Overwrite
-- Openpgp behaviors strictly follow openpgp Definitions
-- Pgp2 generates packets compatible with PGP 2.x
(See online instructions for a complete list of all commands and options)
Example:
-Se-r Bob [file name] is signed and encrypted by the recipient Bob.
-- Clearsign [file name]: sign in plaintext
-- Detach-sign [file name] to separate signatures
-- List-keys [A. A] display key
-- Fingerprint [A. A] fingerprint display
This article from the csdn blog, reproduced please indicate the source: http://blog.csdn.net/fengyuruhui/archive/2007/09/20/1793191.aspx