Chen Tai-dimensional PGP Tutorial (1)

Source: Internet
Author: User
Keywords PGP
Why do you need PGP? Copyright 1996 by Chen Tai-wei [Chen Tai-wei]------------------------------------------------------------------------------- -perhaps you would think that using these confidential programs or systems would make people feel a bit paranoid (paranoid schizophrenia)? In fact, using PGP or a similar confidentiality program depends on how important you think your secret is to you. In fact, there are a lot of people in the world who want to read your personal letters besides the government, and these people are willing to spend a long time reading your letters. It takes a lot of effort to look at the virus programs on many systems, the types of cyber crime and system intrusions. And now the network is gradually moving towards commercial applications, the security and maintenance of network information is the current important topic. Just imagine, if you send an email to your securities agent, ask him to help you to sell all the stock, if you are willing to intercept the message in the process, the content to add to buy 1000 shares, and the revised mail to the hands of the securities business, your loss is self-evident. In addition, even if the invasion of a system does not receive monetary real reward, there are many people such as obsessive-compulsive disorder (obsessive compulsive disorder) like to try to invade the system. such as today's Hot Topic network Hacker (Hacker), Internet espionage (cyperspies), etc., so do not simply think that your email will not be someone to pay attention to, perhaps you are like the Internet (the net) in the heroine Bullock (Sandra Bullock) , has been targeted by a network hacker without knowing it. You should encrypt your e-mail as if you didn't write everything on the back of a postcard, which is really less secretive than a real mail system. When using mail delivery methods such as the Post Office, you should at least seal your letters in opaque envelopes to prevent deliberate peeping. Take a look at the header (Heading) of the email you received, and you will see the e-mail message that it passed through which nodes will be transferred to your hands, which will have the opportunity to peek into your letter at every node. In addition, the exclusive signature provided by PGP is also a validation of the validity and completeness of the file; in other words, checking the PGP signature provided by a software file prevents your computer from infecting the virus. Of course, unless the software is infected with a PGP signature. The last thing to say is that encryption should not be used for illegal purposes, and its purpose should be only to protectProtect personal privacy. And the mere use of PGP does not guarantee that your system will never be invaded or destroyed, just as every other security program or system can provide a relative degree of secrecy, not absolute meaning. --------------------------------------------------------------------------------What is PGP? Copyright 1996 by Chen Tai-wei [Chen Tai-wei]------------------------------------------------------------------------------- -PGP (Pretty) is a program that lets your e-mail (e-mail) have a confidential function. This allows you to encrypt your message (Encrypt), and no one else can read it except those you want to see. Once encrypted, the message looks like a bunch of meaningless garbled characters (Random Characters). PGP provides a strong protection function, even the most advanced decoding analysis technology can not read (Decrypt) encrypted text. PGP encryption and decryption, unlike other traditional methods of encryption, is based on the so-called public Key cryptography (cryptology). For example, when you are sending a confidential letter or file to the author, you must first obtain the author's public key, and add it to your public keyring, and then use the author's public key to encrypt the letter. When the author receives your encrypted letter, the author must use its relative private key (Secret key) to decrypt. Therefore, you cannot unlock a letter that you encrypt unless someone else has the author's private key. At the same time, the author in the use of private key decryption, but also must enter the passcode (pass Phrase), so that the encrypted message after a layer of protection. PGP can also provide PGP-specific signatures at the end of the message (Digital Signature; The exclusive signature is the hope that the reader does not confuse the signature in the e-mail message) without encrypting the content. This is usually when you are publicly delivering messages (such as speaking in a Usenet news discussion group), you don't want to hide what you say, but you want to let others know that the message is actually sent by you. Once the signature is added, PGP can be detected by anyone who changes the message itself or the signature. Although PGP is so easy to use, it cancan lead to leaks because of misuse. You should try to familiarize yourself with the numerous instructions in PGP and use it to send important messages. For example, when you pgp-sa this command, this will only sign the message without encrypting it. Although the result seems to be encrypted, it is not, anyone in the world can restore it to the original text. --------------------------------------------------------------------------------Copyright 1996 by Chen Tai-wei [Chen Tai-wei ]PGP Program of the acquisition of the March 07, 2000, 04:38:21, from the Goldentime said: excerpted from http://home.jxdcb.net.cn/~graywolf/lesson/usage/pgp/ Part03.html--------------------------------------------------------------------------------The acquisition of a PGP program 1996 by Chen Tai-wei [Chen Tai-wei]--------------------------------------------------------------------------------PGP There are four versions of the author: MIT PGP 2.6.2, Viacrypt PGP, PGP 2.6ui and PGP 2.6.3i. All four versions are developed from the 2.3a of PGP created by Phil Zimmermann. The following four versions are described separately.  Installation and setup of PGP March 07, 2000, 04:39:09, from the Goldentime To say:--------------------------------------------------------------------------------the installation and setting of PGP Copyright 1996 by Chen Tai-wei [tai-wei]--------------------------------------------------------------------------------here will begin to introduce PGP 2.6.3i (hereinafter referred to as PGP International edition) of AnnLoading and setting steps. The author assumes that you have a preliminary understanding of MS-DOS disk operating system, and that you have the ability to use uncompressed software to modify the computer's boot-up automatic file AUTOEXEC. BAT with the use of simple clerical editing software. If you are not familiar with these aspects, please refer to the relevant user manual and documentation. --------------------------------------------------------------------------------PGP Installation Way PGP International Edition can be executed on many different operating platforms, But there is also a relative version of the program. When you pass (Download) files, pay special attention to getting the version of your operating system to avoid situations that cannot be performed. Part of the operating platform corresponding to the version of the file name is as follows: Job platform file name Description bit MS-DOS Pgp263i. ZIP is used in a simple DOS environment. 32-bit MS-DOS Pgp263ix. ZIP DOS or Windows 3.x environment, and the CPU must be more than 80386. Windows (95/nt) pgp263i-win32. ZIP Windows95 or NT environment. This article describes the installation and use of the method can be applied to the above three versions, but it will inevitably have a slight difference, so the author will use the system and the environment mainly. The author's system is to use the Windows95 Chinese version, the central processing unit (CPU) is i486dx4-100, the execution environment is to enter the Windows95 in the Chinese version after the Open DOS window. So PGP will use this version of Windows (95/NT) with the filename pgp263i-win32. ZIP. After you obtain the compression file for the PGP Master program, use a similar decompression program such as Pkunzip to extract it to your hard disk. Note that you have to solve all the files in the archive, especially the enclosed file files, PGP will check if there are any of these files when making your new key, otherwise it will not be able to execute. Here's an example: c:\>pkunzip-d pgp263i-win32. ZIP C:\PGP will be pgp263i-win32. The ZIP archive uses Pkunzip to extract the subdirectory of the C:\PGP. When you are done, you will find another subdirectory C:\PGP\DOC in the C:\PGP subdirectory, which is where the documentation file mentioned above is located. Details of the use of the instructions, version update status and copyright announcements, if you readIf you are interested, you can refer to it yourself. How to set up--------------------------------------------------------------------------------PGP autoexec.bat Part of the point is to set up the computer to boot the automatic file AUTOEXEC. BAT content. You must add the following two lines: PATH=C:\PGP This allows the PGP master program to execute in either directory without switching to the directory where the main program resides. Set PGPPATH=C:\PGP set the environment variable of PGP to point to the directory location of PGP main program, which is very important to execute PGP, because PGP will find your public key and private keychain file according to this environment variable, if you do not set this variable, you will not be able to perform PG P。 CONFIG. The TXT section is followed by the configuration configuration file CONFIG for PGP. TXT, this file will be the main program of your PGP in the same directory, its file format is normal text file, please use the General Instrument editor to modify it. The following are the objectives of the document set, to the author's status as an example of summary discussion: myname = "Chen Tai-wei" preset use of the private key name, in the user identification code to represent. If you have two private keys, this option allows you to specify which key to use and, if you do not, automatically take the first one on the private key ring. Generally we use only one private key, and if so, this option is not set. Language = en sets the language representation mode of various messages in the main program. PGP is the use of plug-in multi-language modules to deal with a variety of languages, that is, the main program does not need to change, just change the language module can use different languages to express the message. Generally we are setting English en, recently also developed a Chinese language module on the Internet, interested readers can find relevant information in http://www.ifi.uio.no/pgp/modules.shtml. CharSet = Latin1 Set encoding and decoding conversion character mode. This will relate to the character group pattern that is used when encrypting and decrypting. Generally in Taiwan English and Chinese combined with the situation, usually use Latin1 character group, operational comparison is no problem. Note that the encryption is used in the character group if latin1, decryption will also use latin1 to solve, otherwise the content will be garbled. TMP = "C:\Temp" This is where the staging directory is set. When PGP is executed, it sometimes produces a temporary archive, which is placed in this directory, if you setAs a memory disk drive (RAM disk), the speed of execution will be increased. Armorlines = 0 Sets the maximum number of lines to produce a text file. It is usually set to a value of 0, which indicates no limit on the number of lines produced, and if you set 100, more than 100 lines will be saved to another file. This is especially useful in e-mail programs that limit the maximum number of lines in a single letter. bakring = "A:\SECRING.PGP" sets the directory in which you back up your private key ring. Usually, for safety, a private keychain is backed up in a floppy disk for a rainy-night. Tzfix = +8 Sets the time zone for the location. If you use the Windows95 and PGP 2.6.3i for Win32 versions, you do not need to set that represents the correct GMT time. If you think your own conversion trouble, you can set the same as the author +8, so although not the correct GMT time, but ignore GMT does not look, is the correct time in Taiwan. pubring = "C:\PGP\PUBRING.PGP" secring = "c:\pgp\secring.pgp" randseed = "C:\pgp\randseed.bin" set PGP to which directory to look for public key ring, Private key ring with random file. Usually you have set AUTOEXEC according to the above instructions. Pgppath environment variables in the BAT file, these three settings can also be omitted. Comment = Terry@ms1.hinet.net adds annotated text to the encrypted text file or PGP signature that you generate. It is usually your email address or the home page of the Global Information network. This setting is not set or can be. In CONFIG. There are also some options in the TXT file that are not mentioned in the above, and at this stage I do not encourage you to change or change, unless you do know what the option represents. Otherwise, keep it at the beginning of the preset. When you use and understand PGP for a certain amount of time and degree, change it to your personal needs. Otherwise, it may produce unpredictable consequences on execution. Finally, don't forget to reboot and have the computer reboot to update the contents of the boot automation file you just modified. Thus, the installation and setup of the PGP main program is accomplished. --------------------------------------------------------------------------------Copyright 1996 by Chen Tai-wei [Chen Tai-wei The function and use method of]PGP March 07, 2000, afternoon 04:40:24, from the Goldentime said: excerpted from http://home.jxdcb.net.cn/~graywolf/lesson/usage/pgp/ Part05.html--------------------------------------------------------------------------------the function and use method of PGP program Copyri Ght 1996 by Chen Tai-wei [Chen Tai Dimensional]--------------------------------------------------------------------------------1. produce own public with private keys 2. Spread your public key 3. Join someone else's public key 4. Message Encryption 5. Message decryption 6. Information Visa and Certification 7. Key Visa with trust parameter 8. Key abolition of the 9. Other instructions--------------------------------------------------------------------------------generate their own public and private keys to use PGP's first step, is to produce one's own set of public keys and private keys first. Please execute the following instructions: pgp-kg so PGP will carry out the action of creating the key. You must first answer a few questions: first, the size of the key. PGP presents the following picture: Pick your RSA key size:1) Bits-low commercial grade, fast but pager secure2) 768 Bits-high commercial GR ADE, medium speed, security3) 1024 bits-"military" grade, slow, highest securitychoose 1, 2, or 3, or enter desired Number of bits: Keys can be selected by the three key sizes that PGP provides, 512, 768, and 1024 bits respectively, or you can enter the required bit number and press ENTER to specify the size of the key. The author suggests that one of the things that PGP is provided for is good, because some different versions of PGP cannot accept keys different from these three sizes and the files they encrypt. Of course, the larger the size of the keyThe higher the key confidentiality, the slower the execution speed. The next step is to name the key, and the display of PGP is: You need a user ID to your public key. The desired form for Thisuser ID is your name, followed by your e-mail address enclosed in, if you are have an e-mail address. For the Example:john Q. Smith <12345.6789@compuserve.com>enter A user ID for your public key: the name here is called the user ID, which lives The principle of name is usually in your English name plus your email address, take the author as an example, then in this screen input: Chen Tai-wei and then press the ENTER key. Next you must provide the passcode (pass Phrase) for the private key part of your set of keys, and the display of PGP is as follows: You need a passes Phrase to protect your RSA secret key. Your Pass phrase can is any sentence or phrase and could have manywords, MSN, punctuation, or any other printable ERs. Enter Pass Phrase:enter Mahouve Pass phrase again:1 2 next page >> content navigation to force (0 votes) (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passed (0 Votes) original text: Chen Taiwi PGP Tutorial (1) Back to network security home

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.