How to encrypt file with GNUPG for user who use PGP

Posted on 2006-03-27
Medium Priority
Last Modified: 2010-04-11
Hello experts,
I have secret key (just some word) from user, who use PGP. But we are using GNUPG with legally added idea module.
And we can decrypt files receiving from him.
How can I encrypt file for him, if I don't have any keypair etc....

Thanks a lot
Question by:IKeystone
  • 2
LVL 14

Expert Comment

ID: 16305488
Fundamentally PGP and GNUPG work the same way. If they sent you a secret key, than they sent you the wrong thing.

At least assuming they're using the regular PGP product.

I believe they also have an encrypted zip-file creator. Don't know if WinZip knows how to decrypt those, though.

Author Comment

ID: 16305561
Actually we are working on HP-UNIX. And all that I have from them is a passphrase

Author Comment

ID: 16306283
Hello all,
I just found the solution to avoid keypair:

echo “key” | gpg --pgp2 --passphrase-fd 0 –output “output.file” --symmetric “input.file”

Accepted Solution

GranMod earned 0 total points
ID: 16646194
PAQed with points refunded (500)

Community Support Moderator

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Experts Exchange expands question security options for members.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question