How do I create my own PGP FOR ENCRYPTION PURPOSE use, especially while communicating with parties that have PGP  Created for the public.
Bolton JamesAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Hemil AquinoNetwork EngineerCommented:
What do you want to encrypt?
Instructions are here: https://support.symantec.com/en_US/article.howto41935.html

You don't have to create a key pair to send them a message.  You only need to create a key pair to receive encrypted messages.

To send someone a pgp encrypted message, you need to get their public key and use it to encrypt your message to them.  They will then use their private key to decrypt the message.
First thing, you install pgp on your system. You then generate the private/public key
You can register your public key/associated with your email address, public key exchanges.
Or simply exchange public keys with those with whom you wish to communicate.

Gnu pg
The 7 Worst Nightmares of a Sysadmin

Fear not! To defend your business’ IT systems we’re going to shine a light on the seven most sinister terrors that haunt sysadmins. That way you can be sure there’s nothing in your stack waiting to go bump in the night.

btanExec ConsultantCommented:
May be a rather old article on PGP but the use of OpenPGP is good for beginner and the step through example further shorten the learning curve.
1. Install PGP - sudo port install gnupg2 (where there may be newer package, here is just for illustration)
2. Generate (your) key pair - gpg2 --gen-key (where you should indicate longer key length such as 4096)
3. Publish (your) key to key server - gpg2 --send-keys PUB_KEY_ID (Where PUB_KEY_ID is the public master key ID)
4. Create Revocation list - gpg2 --gen-revoke PUB_KEY_ID > revocert.asc (where you run this if your key is compromised or untrusted anymore)

Assume you want to start communication with encrypting of your document
5. Encrypt (your) document - gpg2 --encrypt document.txt -r "Recipient 1" -r "Recipient 2" (where you stated two recipient in this case, their user ID are "Recipient 1" and "Recipient 2")
6. After running, you get the encrypted document and can save as "document.txt.gpg". (a file encryption key is created to encrypt document and the KEK is in turn encrypted using R1 and also KEK is again encrypted with R2 public key)

Assume you want to start communication with decrypting of your document
7.  Decrypt (other) document - gpg2 --decrypt document.txt.gpg
8. After running, you be prompted to key in a passphrase for private key to decrypt the keys to get the document back in plain text, i.e. document.txt

You can do that in email too and just needed a plugin in... Hope this helps.. pardon for any short syntax

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Bolton JamesAuthor Commented:
Thanks a lot, am going thru this now in order to apply it for use during communication  with mates.

Cheers !
btanExec ConsultantCommented:
For author advice.
btanExec ConsultantCommented:
For consideration
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.