CheckoutChamp PGP Encryption Procedures

Step 1: Generate API Key

gpg --full-generate-key

OR

gpg --default-new-key-algo rsa2048 --gen-key && gpg --full-generate-key

1a. Select (1) RSA and RSA

  • hit enter key

1b. Select 2048 as keysize

  • hit enter key

1c. Specify how long the key should be validd. Is this correct? (y/N):

  • type y

1e. Real Name:

  • type firstname lastname

1f. Email address:

  • type email address

1g. Comment:

  • type any comment

1h. Enter passphrase:

  • enter a phrase with non related words and remember it

1i. Repeat passphrase.

  • Wait for the result by operating computer in various ways.k. On finish, you can see the user-id(uid) like “firstname lastname (comment) < email address >” You can also check “uid” with the command “gpg --list-key”Note: It will take some time to get the uid. Please be patient.

Step 2: Create public key

gpg --list-keys --keyid-format=long    # view the key we just created

then

gpg --export -a "<user-name>" > public.key    # where uid is <user-name> / first name used

Step 3: Create private key

gpg --export-secret-key -a "james" > private.key    # where uid is <user-name> / first name used

Step 4: Encrypt a file

gpg --recipient <user-name> --output <output-file>.pgp --encrypt <input-file>.txt    # where uid is <user-name>

Note: Generally, the file will be encrypted by Konnektive.

Step 5: Decrypt a file

gpg --output <output-file> --decrypt <input-file>    # then enter passphrase

for ASCII armor → add the `--armor` flagExtra Resources;https://bitbucket.org/jameskoonts/workspace/snippets/Az64ER

Last updated