Solved

get private to decrypt

Posted on 2011-03-25
4
387 Views
Last Modified: 2012-05-11
Someone gives me a public key.  How can I get private  key to decrypt?  Is that step called SIGN KEY?  
Thanks.

 gpg -r NAME --output OUTFILE --decrypt INFILE.gpg
0
Comment
Question by:ewang1205
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
abbright earned 500 total points
ID: 35218845
By default you create a private/public key pair. You keep the private key secret and distribute the public key. Someone else can use the public key to encrypt messages to you which you can decrypt using your private key.
If you don't own the corresponding private key you may ask the sender for it but likely he doesn't own it. Rather create a new private / public key pair, send him the public key and ask him to re-encrypt the data using your public key.
0
 

Author Comment

by:ewang1205
ID: 35242559
Thanks.  I ike create a new private / public key pair.  

Is the public key and private key same ID?  All I need is the passphrase to decrpt?  
0
 
LVL 10

Assisted Solution

by:abbright
abbright earned 500 total points
ID: 35242667
I believe the ID of your private and public key are the same.
In order to decrypt you need your private key and the corresponding passphrase.
In order to get some experience you may want to create a simple test file, encrypt it using your public key and then decrypt it again using your private key.
0
 

Author Comment

by:ewang1205
ID: 35242681
Thanks.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Ensuring effective and secure communication in the age of healthcare BYOD.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question