Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

PGP keys

Posted on 2013-12-04
2
Medium Priority
?
536 Views
Last Modified: 2013-12-05
Hi,

Our client asked us to send over pgp key so they can send over files.  Never done this before, when I generate a new key, it asks the email, I put in my email, do I need to type in clients email?  

I just put in mine, my boss's email and sent the key over to the client.   I have not yet received the reply, just wondering if this was correctly done.  

Thx
0
Comment
Question by:mcrmg
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Accepted Solution

by:
Giovanni Heward earned 1200 total points
ID: 39697550
You'll first need to generate your own key pair.  This creates a public and private key.  As the name implies, the public key is what you'll share with your client.  Any data encrypted with your public key (by your client) can only be decrypted with your private key and vice versa (you can encrypt data with your clients public key, and that data can only be decrypted with the clients private key.)

In practice, PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally asymmetric-key cryptography.

Encrypt/Decrypt process
See http://www.nsa.gov/ia/_files/factsheets/I73-FS-035-09.pdf for detailed instructions.

I73-FS-035-09.pdf
0
 

Author Comment

by:mcrmg
ID: 39698042
thank you very much
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I originally wrote this article to compare SARDU and YUMI, but have now added Easy2Boot, since that is the one I currently use and find the easiest to create and alter.
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question