Practical public-key cryptography with GnuPG, part 2 of 2

Posted by subZraw on Dec 13, 2014 10:59 PM EDT
Parabing; By Christos Varelas
Mail this story
Print this story

It doesn’t matter how your email or file will get from A to B. It may go directly, it may go through C, it may go through X and Y and Z -- heck, it may also go through all the letters of the alphabet.

No matter how simple or convoluted the path is, should you choose to strongly encrypt your emails or your files with GnuPG, then nobody but the intended recipients will have access to their contents.

In the previous article of our two-part mini-series we brought forth the core ideas of public-key cryptography. We also presented GnuPG, a freely available software suite which enables any user to strongly encrypt or sign any kind of file, check the validity of digital signatures, and also check the integrity of content. In that same article we demonstrated the use of GnuPG *primarily* for key and certificate management. It’s time we turned our attention to encryption, decryption and signing. We continue to work from the command line of a Linux terminal but, towards the end of this article, we also present a convenient browser add-on which we can readily use to encrypt, decrypt or sign our webmail.

Full Story

  Nav
» Read more about: Story Type: Tutorial

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.