Solved

get private to decrypt

Posted on 2011-03-25
4
390 Views
Last Modified: 2012-05-11
Someone gives me a public key.  How can I get private  key to decrypt?  Is that step called SIGN KEY?  
Thanks.

 gpg -r NAME --output OUTFILE --decrypt INFILE.gpg
0
Comment
Question by:ewang1205
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
abbright earned 500 total points
ID: 35218845
By default you create a private/public key pair. You keep the private key secret and distribute the public key. Someone else can use the public key to encrypt messages to you which you can decrypt using your private key.
If you don't own the corresponding private key you may ask the sender for it but likely he doesn't own it. Rather create a new private / public key pair, send him the public key and ask him to re-encrypt the data using your public key.
0
 

Author Comment

by:ewang1205
ID: 35242559
Thanks.  I ike create a new private / public key pair.  

Is the public key and private key same ID?  All I need is the passphrase to decrpt?  
0
 
LVL 10

Assisted Solution

by:abbright
abbright earned 500 total points
ID: 35242667
I believe the ID of your private and public key are the same.
In order to decrypt you need your private key and the corresponding passphrase.
In order to get some experience you may want to create a simple test file, encrypt it using your public key and then decrypt it again using your private key.
0
 

Author Comment

by:ewang1205
ID: 35242681
Thanks.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question