Home System Tutorial LINUX Encrypt and decrypt files using GPG

Encrypt and decrypt files using GPG

Feb 29, 2024 pm 08:28 PM
linux linux tutorial Red Hat linux system linux command linux certification red hat linux linux video

使用 GPG 加密和解密文件

Goal: Encrypt files using GPG

Distribution: Applies to any distribution

Requirements: Linux with GPG installed or root privileges to install it.

Difficulty: Easy

Promise:

  • # - You need to use root permissions to execute the specified command. You can directly use the root user to execute it, or you can use sudocommand
  • $ - You can use ordinary users to execute specified commands
introduce

Encryption is very important. It is essential to protect sensitive information. Your private files should be encrypted, and GPG provides a great solution.

Install GPG

GPG is widely used. You can find it in almost every distribution's repository. If you haven't installed it yet, do it now.

Debian/Ubuntu

$ sudo apt install gnupg
Copy after login

Fedora

# dnf install gnupg2
Copy after login

Arch

# pacman -S gnupg
Copy after login

Gentoo

# emerge --ask app-crypt/gnupg
Copy after login
Create Key

You need a key pair to encrypt and decrypt files. If you have already generated a key pair for SSH, you can use it directly. If not, GPG includes tools to generate a key pair.

$ gpg --full-generate-key
Copy after login

GPG has a command line program that can help you generate keys step by step. It also has a much simpler tool, but this tool does not let you set the key type, key length, and expiration time, so this tool is not recommended.

GPG will first ask you for the type of key. If there is nothing special, just choose the default value.

The next step is to set the key length. 4096 is a good choice.

After that, you can set the expiration date. Set to 0 if you want the key to never expire.

Then, enter your name.

Finally, enter your email address.

You can also add a comment if you need.

After all this is completed, GPG will ask you to verify the information.

GPG will also ask you if you need to set a password for the key. This step is optional, but will increase the level of protection. If you need to set a password, GPG will collect your operation information to increase the robustness of the key. Once all of this is complete, GPG will display information about the key.

Basic methods of encryption

Now that you have your own key, encrypting your files is very simple. Use the following command to create a blank text file in the /tmp directory.

$ touch /tmp/test.txt
Copy after login

Then encrypt it with GPG. Here the -e flag tells GPG that you want to encrypt the file, and the -r flag specifies the recipient.

$ gpg -e -r "Your Name" /tmp/test.txt
Copy after login

GPG needs to know the recipient and sender of this file. Since this file is yours, there is no need to specify the sender, and the recipient is yourself.

Basic method of decryption

After you receive the encrypted file, you need to decrypt it. You do not need to specify a key for decryption. This information is encoded in the file. GPG will try to decrypt it using the key inside.

$ gpg -d /tmp/test.txt.gpg
Copy after login
Send File

假设你需要发送文件给别人。你需要有接收者的公钥。 具体怎么获得密钥由你自己决定。 你可以让他们直接把公钥发送给你, 也可以通过密钥服务器来获取。

收到对方公钥后,导入公钥到 GPG 中。

$ gpg --import yourfriends.key
Copy after login

这些公钥与你自己创建的密钥一样,自带了名称和电子邮件地址的信息。 记住,为了让别人能解密你的文件,别人也需要你的公钥。 因此导出公钥并将之发送出去。

gpg --export -a "Your Name" > your.key
Copy after login

现在可以开始加密要发送的文件了。它跟之前的步骤差不多, 只是需要指定你自己为发送人。

$ gpg -e -u "Your Name" -r "Their Name" /tmp/test.txt
Copy after login
结语

就这样了。GPG 还有一些高级选项, 不过你在 99% 的时间内都不会用到这些高级选项。 GPG 就是这么易于使用。你也可以使用创建的密钥对来发送和接受加密邮件,其步骤跟上面演示的差不多, 不过大多数的电子邮件客户端在拥有密钥的情况下会自动帮你做这个动作。


The above is the detailed content of Encrypt and decrypt files using GPG. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1655
14
PHP Tutorial
1253
29
C# Tutorial
1228
24
Linux Architecture: Unveiling the 5 Basic Components Linux Architecture: Unveiling the 5 Basic Components Apr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

vscode terminal usage tutorial vscode terminal usage tutorial Apr 15, 2025 pm 10:09 PM

vscode built-in terminal is a development tool that allows running commands and scripts within the editor to simplify the development process. How to use vscode terminal: Open the terminal with the shortcut key (Ctrl/Cmd). Enter a command or run the script. Use hotkeys (such as Ctrl L to clear the terminal). Change the working directory (such as the cd command). Advanced features include debug mode, automatic code snippet completion, and interactive command history.

How to check the warehouse address of git How to check the warehouse address of git Apr 17, 2025 pm 01:54 PM

To view the Git repository address, perform the following steps: 1. Open the command line and navigate to the repository directory; 2. Run the "git remote -v" command; 3. View the repository name in the output and its corresponding address.

How to run java code in notepad How to run java code in notepad Apr 16, 2025 pm 07:39 PM

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

What is the main purpose of Linux? What is the main purpose of Linux? Apr 16, 2025 am 12:19 AM

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

vscode Previous Next Shortcut Key vscode Previous Next Shortcut Key Apr 15, 2025 pm 10:51 PM

VS Code One-step/Next step shortcut key usage: One-step (backward): Windows/Linux: Ctrl ←; macOS: Cmd ←Next step (forward): Windows/Linux: Ctrl →; macOS: Cmd →

How to run sublime after writing the code How to run sublime after writing the code Apr 16, 2025 am 08:51 AM

There are six ways to run code in Sublime: through hotkeys, menus, build systems, command lines, set default build systems, and custom build commands, and run individual files/projects by right-clicking on projects/files. The build system availability depends on the installation of Sublime Text.

laravel installation code laravel installation code Apr 18, 2025 pm 12:30 PM

To install Laravel, follow these steps in sequence: Install Composer (for macOS/Linux and Windows) Install Laravel Installer Create a new project Start Service Access Application (URL: http://127.0.0.1:8000) Set up the database connection (if required)

See all articles