Using PGP encryption: PGP key generation and PGP commands

Source: Internet
Author: User
Keywords PGP
Tags command line file files function get key keys public
PGP is a very popular international encryption software, its function is very powerful, can encrypt various files, generate 256-bit, 512-bit, 1024-bit key. PGP uses the public key encryption system, uses the encryption algorithm to generate two keys, respectively as the public key and the private key. The public key is used for encryption. The private key is used to decrypt and save itself. Here is a description of the use of PGP: 1 first generates your PGP key. In DOS command line input: The Pgp-kg2 program prompts you to step through the key generation: ① Select the key length. Recommended 1024-bit, security is quite secure. ② Enter the username. Try to avoid confusion. ③ Select the password. As with all passwords, try to make it harder to guess. PGP is a case-sensitive password, in the process of generating the program in order to get random numbers, you will be free to knock a series of keys on the keyboard, pay attention to try to knock a few different keys, time interval not too short. Now you have your own pair of PGP keys. File Secringpgp is a private key, PUBRINGPGP is a public key. 3.PGP Basic Command ① Encryption command: pgp-e[a] source file recipient id[Other recipient ID] with the public key ring in the recipient's public key to encrypt the source file, get ciphertext. Plus a parameter will get 7bits encoded ciphertext (asc suffix), otherwise it is binary form cipher (pgp suffix). ② decryption command: pgp[-d][-p] The redaction-d parameter is used to preserve redaction (the default is to remove redaction), and the-p parameter is used to recover the file name when the source file is encrypted. There are many command parameters for PGP, please refer to the software's Setuptxt file for detailed usage. To force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 Votes) passed (0 Votes) text: With PGP encryption: PGP key generation and PGP command return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.