You are on page 1of 7

Experiment No: 6

Aim:
Study of securing messages using GNUPG

Name and roll no Class and Date of Date of

of student Division performance submission

Name: Rahul Gupta BE - B 1/9 /21 6/9/21

Roll no: 279

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Introduction:

PGP (Pretty Good Privacy), is a popular program that is used to


provide confidentiality and authentication services for electronic mail
and file storage. It was designed by Phil Zimmermann way back in
1991. He designed it in such a way, that the best cryptographic
algorithms such as RSA, Diffie-Hellman key exchange, DSS are used for
the public-key encryption (or) asymmetric encryption; CAST-128, 3DES,
IDEA are used for symmetric encryption and SHA-1 is used for hashing
purposes. PGP software is an open source one and is not dependent
on either of the OS (Operating System) or the processor. The
application is based on a few commands which are very easy to use.
The following are the services offered by PGP:

1. Authentication
2. Confidentiality
3. Compression
4. Email Compatibility
5. Segmentation
Open PGP
PGP is a backbone of Open PGP, which is an open- source
standard that allows PGP to be used in software that is typically
free to the public. The term “Open PGP” is often applied to
tools, features or solutions that support open- source PGP
encryption technology.

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Steps:
1. Installation of gpg
$sudo apt-get install gnupg

2. Generation of key
gpg --gen-key

3. Export the PUBLIC KEY


To export a public key into file public.key:
gpg --export -a “User name” > public.key

4. Export the PRIVATE KEY


gpg --export-secret-key -a “User name” > private.key

5. Import a public key:


gpg --import public.key

6. Import private key


gpg --allow-secret-key-import --import private.key

7. List the keys in your public key ring:


gpg –list-keys

8. List the keys in your secret key ring:


gpg –list-secret-keys

9. To encrypt data, use:


gpg -e -u “Sender User name” -r “Receiver User name” file

10. To decrypt data, use:


gpg -d filename.gpg

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Output:

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Conclusion:
Thus, we have explored securing messages using GNUPG.

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC

You might also like