Create keys
gpg --gen-key
gpg (GnuPG) 1.4.10; Copyright (C) 2008 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elgamal
(3) DSA (sign only)
(4) RSA (sign only)
Your selection? 1
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048)
Requested keysize is 2048 bits
Please specify how long the key should be valid.
0 = key does not expire
<n> = key expires in n days
<n>w = key expires in n weeks
<n>m = key expires in n months
<n>y = key expires in n years
Key is valid for? (0)
Key does not expire at all
Is this correct? (y/N) y
You need a user ID to identify your key; the software constructs the user ID
from the Real Name, Comment and Email Address in this form:
"Heinrich Heine (Der Dichter) <[email protected]>"
Real name: Chris Newland
Email address: [email protected]
Comment:
You selected this USER-ID:
"Chris Newland <[email protected]>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
You need a Passphrase to protect your secret key.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key xxxxxxxx marked as ultimately trusted
public and secret key created and signed.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
pub 2048R/xxxxxxxx 2013-01-02
Key fingerprint = xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx
uid Chris Newland <[email protected]>
sub 2048R/xxxxxxxx 2013-01-02
gpg (GnuPG) 1.4.10; Copyright (C) 2008 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elgamal
(3) DSA (sign only)
(4) RSA (sign only)
Your selection? 1
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048)
Requested keysize is 2048 bits
Please specify how long the key should be valid.
0 = key does not expire
<n> = key expires in n days
<n>w = key expires in n weeks
<n>m = key expires in n months
<n>y = key expires in n years
Key is valid for? (0)
Key does not expire at all
Is this correct? (y/N) y
You need a user ID to identify your key; the software constructs the user ID
from the Real Name, Comment and Email Address in this form:
"Heinrich Heine (Der Dichter) <[email protected]>"
Real name: Chris Newland
Email address: [email protected]
Comment:
You selected this USER-ID:
"Chris Newland <[email protected]>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
You need a Passphrase to protect your secret key.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key xxxxxxxx marked as ultimately trusted
public and secret key created and signed.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
pub 2048R/xxxxxxxx 2013-01-02
Key fingerprint = xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx
uid Chris Newland <[email protected]>
sub 2048R/xxxxxxxx 2013-01-02
List available keys
gpg --list-keys
/home/chris/.gnupg/pubring.gpg
------------------------------
pub 2048R/xxxxxxxx 2013-01-02
uid Chris Newland <[email protected]>
sub 2048R/xxxxxxxx 2013-01-02
/home/chris/.gnupg/pubring.gpg
------------------------------
pub 2048R/xxxxxxxx 2013-01-02
uid Chris Newland <[email protected]>
sub 2048R/xxxxxxxx 2013-01-02
Encrypt a file, ASCII Armoured output with given key (creates myfile.tgz.asc)
gpg -e -a -r [email protected] myfile.tgz
Decrypt same file (redirect output to a new file or it will go to the standard out)
gpg -d -a -r [email protected] myfile.tgz.asc > decrypted.tgz
You need a passphrase to unlock the secret key for
user: "Chris Newland <[email protected]>"
2048-bit RSA key, ID xxxxxxxx, created 2013-01-02 (main key ID xxxxxxxx)
You need a passphrase to unlock the secret key for
user: "Chris Newland <[email protected]>"
2048-bit RSA key, ID xxxxxxxx, created 2013-01-02 (main key ID xxxxxxxx)