You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
12.You can choose a separate Signature which creates a .sig file not pasted to the encrypted file. So<br />
you will have two separate files: one encrypted file, and one signature file. We will not apply this<br />
option.<br />
13.The Output in text form option makes the signature readable in text format, just like the same<br />
option used for encrypting.<br />
14.The signature has been done. You can however do this operation in one step thanks to the Number<br />
& Sign button:<br />
Step 3 : Decrypting (PGP)<br />
To decrypt data that is addressed to you (we therefore suppose that you have the proper private key,<br />
or a conventional key in the case <strong>of</strong> conventional numbering), double-click on the .pgp or .asc file, or<br />
use the button: Number and Verify.<br />
1. Click on the button<br />
2. Select the file to be decrypted<br />
3. Enter your secret sentence for the use <strong>of</strong> your private key<br />
4. Choose to save the file again, in clear mode<br />
Step 4 : Adding downloaded public keys (PGP)<br />
Double-click on the .asc file (the one having the keys in question) and choose, with the window that<br />
opens, the keys that you wish to import.<br />
The two other functions <strong>of</strong> PGP (destroying and cleaning unused space) are not <strong>of</strong> any use to<br />
cryptography. The first one is used to to destroy files, and the second one to clean your<br />
disk space. We can now move on to the GPG user manual.<br />
GPG, the free alternative to PGP<br />
GnuPG is the free alternative to PGP, under GPL license. GnuPG is considered as safe and<br />
implements PGP's functions. GPG is available for both Linux and Windows on the<br />
http://www.gnupg.org website. For our demonstration, we will use GPG on Linux. The first necessary<br />
step is to create a pair <strong>of</strong> cryptographic keys:<br />
$ gpg --gen-key<br />
The tool becomes interactive and allows the creation <strong>of</strong> keys step by step. Please note that, as<br />
presented, we can specify a key size above 2048 bits. The keys are generated in the most random<br />
way possible, using factors such as the movements <strong>of</strong> the mouse, the keyboard entries, etc.<br />
The <strong>Hack</strong>ademy DMP -191/209- SYSDREAM