Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

PGP keys

Posted on 2013-12-04
2
Medium Priority
?
544 Views
Last Modified: 2013-12-05
Hi,

Our client asked us to send over pgp key so they can send over files.  Never done this before, when I generate a new key, it asks the email, I put in my email, do I need to type in clients email?  

I just put in mine, my boss's email and sent the key over to the client.   I have not yet received the reply, just wondering if this was correctly done.  

Thx
0
Comment
Question by:mcrmg
2 Comments
 
LVL 15

Accepted Solution

by:
Giovanni Heward earned 1200 total points
ID: 39697550
You'll first need to generate your own key pair.  This creates a public and private key.  As the name implies, the public key is what you'll share with your client.  Any data encrypted with your public key (by your client) can only be decrypted with your private key and vice versa (you can encrypt data with your clients public key, and that data can only be decrypted with the clients private key.)

In practice, PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally asymmetric-key cryptography.

Encrypt/Decrypt process
See http://www.nsa.gov/ia/_files/factsheets/I73-FS-035-09.pdf for detailed instructions.

I73-FS-035-09.pdf
1
 

Author Comment

by:mcrmg
ID: 39698042
thank you very much
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question