0% found this document useful (0 votes)
84 views7 pages

Experiment No: 6: Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC

The document describes steps to secure messages using GNUPG: 1. GNUPG (Gnu Privacy Guard) is an open source implementation of PGP for encryption and signing of messages and files. 2. The steps include installing GNUPG, generating public/private key pairs, exporting the keys, importing keys, and using the keys to encrypt and decrypt files and data. 3. The process allows users to authenticate, provide confidentiality, and digitally sign messages and files using asymmetric and symmetric encryption algorithms.

Uploaded by

RAHUL GUPTA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views7 pages

Experiment No: 6: Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC

The document describes steps to secure messages using GNUPG: 1. GNUPG (Gnu Privacy Guard) is an open source implementation of PGP for encryption and signing of messages and files. 2. The steps include installing GNUPG, generating public/private key pairs, exporting the keys, importing keys, and using the keys to encrypt and decrypt files and data. 3. The process allows users to authenticate, provide confidentiality, and digitally sign messages and files using asymmetric and symmetric encryption algorithms.

Uploaded by

RAHUL GUPTA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Experiment No: 6

Aim:
Study of securing messages using GNUPG

Name and roll no Class and Date of Date of

of student Division performance submission

Name: Rahul Gupta BE - B 1/9 /21 6/9/21

Roll no: 279

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Introduction:

PGP (Pretty Good Privacy), is a popular program that is used to


provide confidentiality and authentication services for electronic mail
and file storage. It was designed by Phil Zimmermann way back in
1991. He designed it in such a way, that the best cryptographic
algorithms such as RSA, Diffie-Hellman key exchange, DSS are used for
the public-key encryption (or) asymmetric encryption; CAST-128, 3DES,
IDEA are used for symmetric encryption and SHA-1 is used for hashing
purposes. PGP software is an open source one and is not dependent
on either of the OS (Operating System) or the processor. The
application is based on a few commands which are very easy to use.
The following are the services offered by PGP:

1. Authentication
2. Confidentiality
3. Compression
4. Email Compatibility
5. Segmentation
Open PGP
PGP is a backbone of Open PGP, which is an open- source
standard that allows PGP to be used in software that is typically
free to the public. The term “Open PGP” is often applied to
tools, features or solutions that support open- source PGP
encryption technology.

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Steps:
1. Installation of gpg
$sudo apt-get install gnupg

2. Generation of key
gpg --gen-key

3. Export the PUBLIC KEY


To export a public key into file public.key:
gpg --export -a “User name” > public.key

4. Export the PRIVATE KEY


gpg --export-secret-key -a “User name” > private.key

5. Import a public key:


gpg --import public.key

6. Import private key


gpg --allow-secret-key-import --import private.key

7. List the keys in your public key ring:


gpg –list-keys

8. List the keys in your secret key ring:


gpg –list-secret-keys

9. To encrypt data, use:


gpg -e -u “Sender User name” -r “Receiver User name” file

10. To decrypt data, use:


gpg -d filename.gpg

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Output:

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Conclusion:
Thus, we have explored securing messages using GNUPG.

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC

You might also like