Dies ist eine alte Version des Dokuments!
Abstract: The sender encrypts a file with the public key of the receiver. After sending the receiver decrypts the file with his secret key. Digital Signatures are also possible. Infos from man pgp
or Manual
Create a new primary keypair and ~/.gnupg
with gpg --gen-key
. Keep all default values. Specifiy given name, surname, and email adress. Comment can be omitted.
Create a revocation certificate with gpg --output revoke.asc --gen-revoke <mykey>
to declare your public key invalid in case the private key gets lost or exposed. mykey
must be a substring of the user ID which you specified at keypair cration. Copy it eg to a floppy disk and lock it.
Optionally list your key(s) with gpg --list-keys
Export a public key (create a texfile of your public key) with gpg --armor --export <mykey> > myFullName.asc
Import a foreign public key by issuing pgp --import harryHirsch.asc
. Check with gpg --list-keys
.
Validate the key with gpg --edit-key Harry
→ fpr
→ Compare fingerprint by word of mouth → sign
→ check
→ quit
→ save:y
Encryption of a file is done by gpg --encrypt file
and decrpytion by gpg --decrypt file.gpg > file
Delete a key with gpg --delete Harry
kgpg
is a graphical frontent on slackware.