You are here: hacking technology > encryption decipher > Content
Hot Articles
Recommend Articles
New Articles
Open source code encryption tool GPG application method
  Add date: 07/17/2008   Publishing date: 07/17/2008   Hits: 50
Total 2 pages, Current page:1, Jump to page:
 
GPG and PGP are two kind of encrpytion softwares, you may through the public key on-line security dissemination your document. I had few days ago used GPG, feels is very convenient, in the use has also met some questions. Therefore writes mine use process, the goal is the friend who lets first use GPG little detours.
Said first GPG obtains, GPG is opens the source code the software, is completely free, everybody may arrive at www.gnupg.org to download. If uses Mandrakelinux or the Debian release version may download directly. What I use is Mandrakelinux, so long as inputs urpmi gpgp in the terminal to be possible to download and the installment.
After installing, we input under the terminal: gpg --help may see GPG the edition information and the help. This expressed that GPG already installed.
Below we produce the key, enters: gpg --gen-key will present several options by now, needs us to choose:
gpg (GnuPG) 1.4.0; Copyright (C) 2004 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.
Please choose the key type which you must use:
 (1) DSA and ElGamal (default)
 (2) DSA (only uses in signature)
 (5) RSA (only uses in signature)
Your choice?                    This we choose the 1, gpg default are also 1 generally.
SA keypair will have 1024 bits.
ELG-E keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048)             This is key's length, generally inputs 1024
Please establish this key's date of expiry.
       0 = keys never expired
    <n> = key n day later expired
    <n>w = key the n week later expired
    <n>m = key n month later expired
    <n>y = key n year later expired
Key's date of expiry is? (0)         This assigns key's term of validity, you may choose.
You need an user identification to recognize your key; This software can use the real name, the annotation and the electronic mail address combines
Becomes the user identification, as follows shows:
  “Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>”
Real name:                      
Electronic mail address:
Annotation:
This is the user identification, you may input oneself commonly used email address.
Please input the password:  
This needs to assign a protection password for yours private key, this must certainly protect, otherwise your encryption document easily will be untied by others.
 Good present GPG had already had your public key and the private key.

 
Other pages: : 1 * 2 * Next>>
Prev:Establishes a stealth password as the WindowsXP system Next:The Web violence explains

Comment:

Category: Home > encryption decipher