In order for someone to be able to send encrypted messages or files to a receiver, that someone needs to get hold of the receivers public key. GPG will print the outcomes of its activity on the terminal, after the key pair has been generated.This serves the purpose of creating more randomness (which computers in general are not very capable of) and helps in generating a more secure key. During this period, GPG will ask you to do some activity on with your computer. ![]() Now GPG will start generating a key pair. Without it your key pair is useless and you won’t be able to decrypt messages sent to you using that key pair. It’s very important that you don’t lose your passphrase. The passphrase is a crucial part of the system since it’s the only thing that protects your private key in case your system should get compromised. Now you should get a dialogue box, asking you to enter a passphrase.Now GnuPG wants to construct a user ID to identify your keyĮnter Real name, then Email addres and then optionally a Comment.Confirm 0 = key does not expire and then again by entering y.įor most purposes, either accepting the default or specifying 1y for one year, should be appropriate.Confirm the default DSA keysize of 2048 bits. ![]() RSA and DSA/Elgamal are both considered to be very secure, but until more recently, GnuPG didn’t use RSA, so legacy GPG users might have a problem.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |