Solved

get private to decrypt

Posted on 2011-03-25
4
389 Views
Last Modified: 2012-05-11
Someone gives me a public key.  How can I get private  key to decrypt?  Is that step called SIGN KEY?  
Thanks.

 gpg -r NAME --output OUTFILE --decrypt INFILE.gpg
0
Comment
Question by:ewang1205
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
abbright earned 500 total points
ID: 35218845
By default you create a private/public key pair. You keep the private key secret and distribute the public key. Someone else can use the public key to encrypt messages to you which you can decrypt using your private key.
If you don't own the corresponding private key you may ask the sender for it but likely he doesn't own it. Rather create a new private / public key pair, send him the public key and ask him to re-encrypt the data using your public key.
0
 

Author Comment

by:ewang1205
ID: 35242559
Thanks.  I ike create a new private / public key pair.  

Is the public key and private key same ID?  All I need is the passphrase to decrpt?  
0
 
LVL 10

Assisted Solution

by:abbright
abbright earned 500 total points
ID: 35242667
I believe the ID of your private and public key are the same.
In order to decrypt you need your private key and the corresponding passphrase.
In order to get some experience you may want to create a simple test file, encrypt it using your public key and then decrypt it again using your private key.
0
 

Author Comment

by:ewang1205
ID: 35242681
Thanks.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question