Sometimes yous ask to ship a file containing sensitive information across to someone over cyberspace in addition to yous started thinking, “Gee, I’ve got to a greater extent than or less pretty sensitive information inward the file. How tin lavatory I ship it securely?” There are many ways to ship encrypted files. H5N1 expert way for encrypting files is using a long password with GPG or GNU Privacy Guard (GnuPG or GPG) tool. Once you’ve encrypted the file, yous tin lavatory exercise few things.
- Put the file inward an FTP or Web server the requires a 2d develop of username in addition to passwords.
- To farther secure, yous tin lavatory lay a firewall dominion to allow a unmarried IP/Network to access that location.
- Send the file via e-mail every bit an attachment.
- Send the file via encrypted email. (double encryption). We volition expect into e-mail encryption soon.
- Create a torrent file in addition to ship it securely every bit a private torrent if the file is likewise big. (i.e. movies, large files etc.)
So the possibilities are endless. GnuPG or GPG industrial plant inward Windows, Linux, Mac (any iOS devices), Android, Blackberry etc. In brusque GnuPG or GPG is supported on all platforms in addition to that’s what makes it such a expert encryption tool.
GNU Privacy Guard (GnuPG or GPG)
GnuPG is a hybrid encryption software computer programme inward that it uses a combination of conventional symmetric-key cryptography for speed, in addition to public-key cryptography for ease of secure fundamental exchange, typically past times using the recipient’s world fundamental to encrypt a session fundamental which is entirely used once. This means of functioning is business office of the OpenPGP touchstone in addition to has been business office of PGP from its start version.
GnuPG encrypts messages using asymmetric keypairs individually generated past times GnuPG users. The resulting world keys may last exchanged alongside other users inward a diversity of ways, such every bit Internet fundamental servers. They must ever last exchanged carefully to forestall identity spoofing past times corrupting world fundamental “owner” identity correspondences. It is also possible to add together a cryptographic digital signature to a message, thus the message integrity in addition to sender tin lavatory last verified, if a item correspondence relied upon has non been corrupted.
Downloan GnuPG
You tin lavatory download GnuPG for the next Operating systems from this Download GnuPG link.
- Windows
- OS X
- Debian
- RPM
- Android
- VMS (OpenVMS)
- RISC OS
- *BSD
- *NIX
- AIX
- HPUX
- IRIX
- Solaris, SunOS
List of supported Operating systems tin lavatory last flora inward GnuPG Supported Operating Systems list.
Apart from these, most operating systems accept their ain implementation of GnuPG which are supported past times each other every bit the underlying encryption in addition to decryption industrial plant inward a similar way.
Encrypting files inward Linux
To encrypt a unmarried file, purpose ascendancy gpg every bit follows:
root@kali: # gpg -c secretfilename
To encrypt secretfilename.txt
file, type the command:
root@kali: # gpg -c secretfilename.txt
Sample output:
Enter passphrase:
Repeat passphrase:
This volition create a secretfilename.txt.gpg
file. GnuPG or GPG aid doco below:
GnuPG or GPG aid menu
GnuPG or GPG aid menu
root@kali: # gpg --help
gpg (GnuPG) 1.4.12
Copyright (C) 2012 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version iii or after <http://gnu.org/licenses/gpl.html>
This is costless software: yous are costless to alter in addition to redistribute it.
There is NO WARRANTY, to the extent permitted past times law.
Home: /.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128,
CAMELLIA192, CAMELLIA256
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
Syntax: gpg [options] [files]
sign, check, encrypt or decrypt
default functioning depends on the input data
Commands:
-s, --sign [file] brand a signature
--clearsign [file] brand a clear text signature
-b, --detach-sign brand a detached signature
-e, --encrypt encrypt data
-c, --symmetric encryption entirely alongside symmetric cipher
-d, --decrypt decrypt information (default)
--verify verify a signature
--list-keys listing keys
--list-sigs listing keys in addition to signatures
--check-sigs listing in addition to banking concern check fundamental signatures
--fingerprint listing keys in addition to fingerprints
-K, --list-secret-keys listing undercover keys
--gen-key generate a novel fundamental pair
--delete-keys take keys from Earth keyring
--delete-secret-keys take keys from the undercover keyring
--sign-key sign a key
--lsign-key sign a fundamental locally
--edit-key sign or edit a key
--gen-revoke generate a revocation certificate
--export export keys
--send-keys export keys to a fundamental server
--recv-keys import keys from a fundamental server
--search-keys search for keys on a fundamental server
--refresh-keys update all keys from a keyserver
--import import/merge keys
--card-status impress the card status
--card-edit alter information on a card
--change-pin alter a card's PIN
--update-trustdb update the trust database
--print-md algo [files] impress message digests
Options:
-a, --armor create ascii armored output
-r, --recipient NAME encrypt for NAME
-u, --local-user purpose this user-id to sign or decrypt
-z due north develop compress marking due north (0 disables)
--textmode purpose canonical text mode
-o, --output purpose every bit output file
-v, --verbose verbose
-n, --dry-run exercise non brand whatever changes
-i, --interactive prompt earlier overwriting
--openpgp purpose strict OpenPGP behavior
--pgp2 generate PGP 2.x compatible messages
(See the human being page for a consummate listing of all commands in addition to options)
Examples:
-se -r Bob [file] sign in addition to encrypt for user Bob
--clearsign [file] brand a clear text signature
--detach-sign [file] brand a detached signature
--list-keys [names] demo keys
--fingerprint [names] demo fingerprints
Please study bugs to <gnupg-bugs@gnu.org>.
If yous ever forgot your password
(passphrase), yous cannot recover the information every bit it purpose rattling potent encryption.
Decrypt a file
To decrypt file purpose the gpg ascendancy every bit follow:
root@kali: # gpg secretfilename.txt.gpg
Sample outputs:
gpg secretfilename.txt.gpg
gpg: CAST5 encrypted data
Enter passphrase:
Decrypt file in addition to write output to file secretfilename.txt yous tin lavatory run command:
root@kali: # gpg secretfilename.txt.gpg –o secretfilename.txt
Famous usage of GnuPG
In May 2014, The Washington Post reported on a 12-minute video guide “GPG for Journalists” posted to Vimeo inward Jan 2013 past times a user named anon108. The Post identified anon108 every bit fugitive NSA leaker Edward Snowden, who it said made the tutorial—”narrated past times a digitally disguised phonation whose speech communication patterns audio similar to those of Snowden”—to learn journalist Glenn Greenwald e-mail encryption. Greenwald said that he could non confirm the authorship of the video.
Conclusion
As yous tin lavatory see, GnuPG does accept existent life usage in addition to inward many cases it was used inward both legal in addition to illegal activities. I won’t learn inward to utter over almost the legality of the usage, only if yous are ever inward the ask of sending in addition to transferring a file that requires encryption, in addition to thus GnuPG or GPG is definitely a worthy tool to consider for encrypting files inward Linux, Unix, Windows or whatever known platforms.
Hope you’ve enjoyed this lilliputian guide. Please portion in addition to RT.