Solved

PGP encryption in UNIX

Posted on 2013-06-25
8
587 Views
Last Modified: 2013-06-26
Hi All,
 I have to encrypt a file using PGP encryption in unix.I have posted a similiar question some time back and some one replied to use GPG for this.But,I want to know the difference between PGP and GPG.I know that PGP is licensed and GPG is a freeware.

My company is purchasing a license for PGP so I dont think i can use GPG is for this right??and they are trying to install the PGP software  on the unix server.
So,I need some help or documents that can guide me through this.
I just need to encrypt the file using PGP encryption and place it in the directory.

Appreciate your help on this,

Thanks and Regards,
0
Comment
Question by:ra100020
  • 5
  • 3
8 Comments
 
LVL 23

Expert Comment

by:nemws1
Comment Utility
They are compatible systems.  You can encrypt or decrypt a PGP file using GPG and vice versa.
0
 
LVL 23

Expert Comment

by:nemws1
Comment Utility
In fact, my keys were all created using PGP on one system and I converted over to using GPG and didn't have to update any of my files.
0
 

Author Comment

by:ra100020
Comment Utility
Thanks a lot.Do I have to also install to GPG too on the server??.
When we use ex:   gpg - encrypt -filename,  can unix understand the line without installing gpg software??
0
 
LVL 23

Expert Comment

by:nemws1
Comment Utility
Most likely you *will* have to install it on the server if you want to encrypt/decrypt files there.  What OS is your server running?  There are binaries for every major OS so installation should be fairly easy.
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 

Author Comment

by:ra100020
Comment Utility
I am using a HP unix server.I just had a doubt of whether to install PGP software or GPG software.My company said they are installing PGP software on the server so i thought commands related to pgp would be used??and i want to know what those are.

But earlier someone said,i can also use gpg commands for pgp encryption.So,to be frank i am kind of confused.


Appreciate your help,
0
 
LVL 23

Expert Comment

by:nemws1
Comment Utility
Ask your server administrator which one is installed.  You just need *either* one.
0
 

Author Comment

by:ra100020
Comment Utility
Thank a lot.
Administrator said they have installed PGP so can you let me know what are the commands or procedure to encrypt and decyrpt a file in unix using PGP commands??

Appreciate your help,
0
 
LVL 23

Accepted Solution

by:
nemws1 earned 500 total points
Comment Utility
Here's a great guide.  Most of it is very useful:

http://www.cs.wm.edu/pgp.html

You probably won't see to read the section on "Using PGP in exmh", but the rest is good.

Basically...
Encrypt:  pgp -e <filename>
Decrypt: pgp <filename>
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
AIX  NFS  question 5 89
Linux : can't create transaction lock error 1 49
Write an app 10 61
Linux "time" command output redirection 16 73
Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now