[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

get private to decrypt

Posted on 2011-03-25
4
Medium Priority
?
402 Views
Last Modified: 2012-05-11
Someone gives me a public key.  How can I get private  key to decrypt?  Is that step called SIGN KEY?  
Thanks.

 gpg -r NAME --output OUTFILE --decrypt INFILE.gpg
0
Comment
Question by:ewang1205
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
abbright earned 2000 total points
ID: 35218845
By default you create a private/public key pair. You keep the private key secret and distribute the public key. Someone else can use the public key to encrypt messages to you which you can decrypt using your private key.
If you don't own the corresponding private key you may ask the sender for it but likely he doesn't own it. Rather create a new private / public key pair, send him the public key and ask him to re-encrypt the data using your public key.
0
 

Author Comment

by:ewang1205
ID: 35242559
Thanks.  I ike create a new private / public key pair.  

Is the public key and private key same ID?  All I need is the passphrase to decrpt?  
0
 
LVL 10

Assisted Solution

by:abbright
abbright earned 2000 total points
ID: 35242667
I believe the ID of your private and public key are the same.
In order to decrypt you need your private key and the corresponding passphrase.
In order to get some experience you may want to create a simple test file, encrypt it using your public key and then decrypt it again using your private key.
0
 

Author Comment

by:ewang1205
ID: 35242681
Thanks.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question