27.06.2013 Views

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

12.You can choose a separate Signature which creates a .sig file not pasted to the encrypted file. So<br />

you will have two separate files: one encrypted file, and one signature file. We will not apply this<br />

option.<br />

13.The Output in text form option makes the signature readable in text format, just like the same<br />

option used for encrypting.<br />

14.The signature has been done. You can however do this operation in one step thanks to the Number<br />

& Sign button:<br />

Step 3 : Decrypting (PGP)<br />

To decrypt data that is addressed to you (we therefore suppose that you have the proper private key,<br />

or a conventional key in the case <strong>of</strong> conventional numbering), double-click on the .pgp or .asc file, or<br />

use the button: Number and Verify.<br />

1. Click on the button<br />

2. Select the file to be decrypted<br />

3. Enter your secret sentence for the use <strong>of</strong> your private key<br />

4. Choose to save the file again, in clear mode<br />

Step 4 : Adding downloaded public keys (PGP)<br />

Double-click on the .asc file (the one having the keys in question) and choose, with the window that<br />

opens, the keys that you wish to import.<br />

The two other functions <strong>of</strong> PGP (destroying and cleaning unused space) are not <strong>of</strong> any use to<br />

cryptography. The first one is used to to destroy files, and the second one to clean your<br />

disk space. We can now move on to the GPG user manual.<br />

GPG, the free alternative to PGP<br />

GnuPG is the free alternative to PGP, under GPL license. GnuPG is considered as safe and<br />

implements PGP's functions. GPG is available for both Linux and Windows on the<br />

http://www.gnupg.org website. For our demonstration, we will use GPG on Linux. The first necessary<br />

step is to create a pair <strong>of</strong> cryptographic keys:<br />

$ gpg --gen-key<br />

The tool becomes interactive and allows the creation <strong>of</strong> keys step by step. Please note that, as<br />

presented, we can specify a key size above 2048 bits. The keys are generated in the most random<br />

way possible, using factors such as the movements <strong>of</strong> the mouse, the keyboard entries, etc.<br />

The <strong>Hack</strong>ademy DMP -191/209- SYSDREAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!