?
Solved

get private to decrypt

Posted on 2011-03-25
4
Medium Priority
?
392 Views
Last Modified: 2012-05-11
Someone gives me a public key.  How can I get private  key to decrypt?  Is that step called SIGN KEY?  
Thanks.

 gpg -r NAME --output OUTFILE --decrypt INFILE.gpg
0
Comment
Question by:ewang1205
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
abbright earned 2000 total points
ID: 35218845
By default you create a private/public key pair. You keep the private key secret and distribute the public key. Someone else can use the public key to encrypt messages to you which you can decrypt using your private key.
If you don't own the corresponding private key you may ask the sender for it but likely he doesn't own it. Rather create a new private / public key pair, send him the public key and ask him to re-encrypt the data using your public key.
0
 

Author Comment

by:ewang1205
ID: 35242559
Thanks.  I ike create a new private / public key pair.  

Is the public key and private key same ID?  All I need is the passphrase to decrpt?  
0
 
LVL 10

Assisted Solution

by:abbright
abbright earned 2000 total points
ID: 35242667
I believe the ID of your private and public key are the same.
In order to decrypt you need your private key and the corresponding passphrase.
In order to get some experience you may want to create a simple test file, encrypt it using your public key and then decrypt it again using your private key.
0
 

Author Comment

by:ewang1205
ID: 35242681
Thanks.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Let's recap what we learned from yesterday's Skyport Systems webinar.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question