Encrypt and decrypt files using GPG
Goal: Encrypt files using GPG
Distribution: Applies to any distribution
Requirements: Linux with GPG installed or root privileges to install it.
Difficulty: Easy
Promise:
- # - You need to use root permissions to execute the specified command. You can directly use the root user to execute it, or you can use sudocommand
- $ - You can use ordinary users to execute specified commands
Encryption is very important. It is essential to protect sensitive information. Your private files should be encrypted, and GPG provides a great solution.
GPG is widely used. You can find it in almost every distribution's repository. If you haven't installed it yet, do it now.
Debian/Ubuntu
$ sudo apt install gnupg
Fedora
# dnf install gnupg2
Arch
# pacman -S gnupg
Gentoo
# emerge --ask app-crypt/gnupg
You need a key pair to encrypt and decrypt files. If you have already generated a key pair for SSH, you can use it directly. If not, GPG includes tools to generate a key pair.
$ gpg --full-generate-key
GPG has a command line program that can help you generate keys step by step. It also has a much simpler tool, but this tool does not let you set the key type, key length, and expiration time, so this tool is not recommended.
GPG will first ask you for the type of key. If there is nothing special, just choose the default value.
The next step is to set the key length. 4096 is a good choice.
After that, you can set the expiration date. Set to 0 if you want the key to never expire.
Then, enter your name.
Finally, enter your email address.
You can also add a comment if you need.
After all this is completed, GPG will ask you to verify the information.
GPG will also ask you if you need to set a password for the key. This step is optional, but will increase the level of protection. If you need to set a password, GPG will collect your operation information to increase the robustness of the key. Once all of this is complete, GPG will display information about the key.
Now that you have your own key, encrypting your files is very simple. Use the following command to create a blank text file in the /tmp directory.
$ touch /tmp/test.txt
Then encrypt it with GPG. Here the -e flag tells GPG that you want to encrypt the file, and the -r flag specifies the recipient.
$ gpg -e -r "Your Name" /tmp/test.txt
GPG needs to know the recipient and sender of this file. Since this file is yours, there is no need to specify the sender, and the recipient is yourself.
After you receive the encrypted file, you need to decrypt it. You do not need to specify a key for decryption. This information is encoded in the file. GPG will try to decrypt it using the key inside.
$ gpg -d /tmp/test.txt.gpg
假设你需要发送文件给别人。你需要有接收者的公钥。 具体怎么获得密钥由你自己决定。 你可以让他们直接把公钥发送给你, 也可以通过密钥服务器来获取。
收到对方公钥后,导入公钥到 GPG 中。
$ gpg --import yourfriends.key
这些公钥与你自己创建的密钥一样,自带了名称和电子邮件地址的信息。 记住,为了让别人能解密你的文件,别人也需要你的公钥。 因此导出公钥并将之发送出去。
gpg --export -a "Your Name" > your.key
现在可以开始加密要发送的文件了。它跟之前的步骤差不多, 只是需要指定你自己为发送人。
$ gpg -e -u "Your Name" -r "Their Name" /tmp/test.txt
就这样了。GPG 还有一些高级选项, 不过你在 99% 的时间内都不会用到这些高级选项。 GPG 就是这么易于使用。你也可以使用创建的密钥对来发送和接受加密邮件,其步骤跟上面演示的差不多, 不过大多数的电子邮件客户端在拥有密钥的情况下会自动帮你做这个动作。
The above is the detailed content of Encrypt and decrypt files using GPG. For more information, please follow other related articles on the PHP Chinese website!

The startup process of Linux includes: 1. Start BIOS/UEFI, 2. Load GRUB, 3. Load kernel and initrd, 4. Execute init process, 5. Start system services, 6. Start login manager; the startup process of Windows includes: 1. Start BIOS/UEFI, 2. Load WindowsBootManager, 3. Load winload.exe, 4. Load tonskrnl.exe and HAL, 5. Start system services, 6. Start login screen; Linux provides more customization options, while Windows pays more attention to user experience and stability.

This guide details how to configure automatic service restarts in Linux using systemd, enhancing system reliability and minimizing downtime. System administrators often rely on this functionality to ensure critical services, such as web servers (Apa

As Linux users, we often rely on commonly used commands ls, grep, awk, sed and find to complete the work. But Linux has a large number of lesser-known commands that can save time, automate tasks and simplify workflows. This article will explore some underrated but powerful Linux commands that deserve more attention. rename – efficient batch rename files The rename command is the savior when you need to rename multiple files at once. Without using loops containing mv, rename allows you to easily apply complex renaming patterns. Change all .txt files to .log. rename 's/\.txt$/\.log/' *

Linux systems provide various system services (such as process management, login, syslog, cron, etc.) and network services (such as remote login, email, printer, web hosting, data storage, file transfer, domain name resolution (using DNS), dynamic IP address allocation (using DHCP), and so on). Technically, a service is a process or group of process (usually known as a daemon) that runs continuously in the background, waiting for incoming requests (especially from the client). Linux supports different ways to manage services (start, stop, restart, enable automatic startup at system startup, etc.), usually through a process or service manager. Almost all modern Linux distributions now use the same

Run Windows Software and Games on Linux with CrossOver 25 Running Windows applications and games on Linux is now easier than ever, thanks to CrossOver 25 from CodeWeavers. This commercial software solution lets Linux users run a wide variety of Wind
![pCloud - The Most Secure Cloud Storage [50% Off Offer]](https://img.php.cn/upload/article/001/242/473/174580357418126.jpg?x-oss-process=image/resize,p_40)
Secure Your Data with pCloud: A Comprehensive Guide to Linux Installation pCloud, a leading secure cloud storage service, provides a robust platform for managing your files and data. This guide details the installation process on Linux systems. About

MangoHud: A powerful tool for real-time monitoring of Linux gaming performance MangoHud is a powerful and lightweight tool designed for gamers, developers, and anyone who wants to monitor system performance in real time. It acts as an overlay for Vulkan and OpenGL applications, displaying important information such as FPS, CPU and GPU usage, temperature, etc. This article will explore the functions, working principles and usage of MangoHud, and provide step-by-step instructions for installing and configuring MangoHud on Linux systems. What is MangoHud? MangoHud is an open source project available on GitHub and aims to provide a simple and customizable way to monitor

Managing archived files is a common task in Linux. This article, the first of a two-part series, explores five powerful command-line archive tools, detailing their features and usage with examples. 1. The tar Command: A Versatile Archiving Utility t


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Dreamweaver Mac version
Visual web development tools

Atom editor mac version download
The most popular open source editor
