?
Solved

How a non IT user can create public and private keys

Posted on 2010-08-17
7
Medium Priority
?
555 Views
Last Modified: 2012-05-10
I have a non IT user that needs an easy, free, and quick way (not command line) to create a public key that he can give to someone else that will be emailing him sensitive files. Thanks for your help.
0
Comment
Question by:canalicomputers
7 Comments
 
LVL 4

Accepted Solution

by:
DeadRatRacer earned 336 total points
ID: 33456877
Perhaps this would work for you?

Create self-signed X.509 certificates in a flash with Self-Cert

http://www.pluralsight-training.net/community/blogs/keith/archive/2009/01/22/create-self-signed-x-509-certificates-in-a-flash-with-self-cert.aspx
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 1000 total points
ID: 33463640
xca is your friend - easy to use, gui tool.

http://sourceforge.net/projects/xca <--- download
http://xca.sourceforge.net/ <-- manual
0
 
LVL 12

Assisted Solution

by:sarangk_14
sarangk_14 earned 664 total points
ID: 33466891
If I understand correctly, you are looking for Public Key Encryption Solution, where your non-IT user keeps a private key known only to him and send the corresponding public key to the person, who's expected to send encrypted sensitive files to this non-IT user.

There are a number of applications which will allow you to do this using non command-line. A couple of popular ones that come to mind are PGP Desktop and GPG4Win.

Both these products enjoy a good community support, providing all possible help, and are considered to be highly safe. There are some excellent guides available on the Internet that offer step-by-step instructions for setting either of the product up.

You can search the internet for more information.
The download links or the web-site URLs for these products are:
http://www.pgp.com/downloads/desktoptrial/desktoptrial2.html
http://www.gpg4win.org/

Hope this helps.

Warm regards,

Sarang
0
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 1000 total points
ID: 33467637
sarangk: OpenPgp is an excellent solution - in many ways better than s/mime - but the downside is that it requires specialized software that the sender may not have. s/mime on the other hand requires only that the sender has an email client and has received a signed message from the intended recipient - significantly easier :)
0
 
LVL 12

Assisted Solution

by:sarangk_14
sarangk_14 earned 664 total points
ID: 33473307
Hi Dave,

I was concentrating more on the Sensitivity of the documents, as mentioned by the OP.
Hence I went the PGP/ GPG way.

Regards,

Sarang
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 1000 total points
ID: 33473583
Sarangk: I agree completely - I have several solutions here, and use them in order of preference:

gpg (enigmail on thunderbird)
s/mime (self generated using xca, although I have two personal certs for private nets)
7-zip (aes@256, supports self extractor exes)

for transit devices I also use truecrypt, but it is too awkward to use for mail.
0
 

Author Closing Comment

by:canalicomputers
ID: 33491123
Thanks guys
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Experts Exchange expands question security options for members.
With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question