Application encryption algorithm

The following is a summary of PGP encryption software to learn:

I use a PGP-Pretty Good Privacy, it is a system based on RSA public key encryption mail encryption software.

It can achieve encryption for files, email, disk, and ICQ communication content, decryption, digital signature capabilities for businesses, government agencies, health care sector, education sector, home personal use secure communication. And, PGP companies for different needs of different sectors, were introduced different PGP solutions.

PGP is encrypted using the RSA encryption algorithm and the conventional hybrid encryption achieved. Characterized by a pair of key encryption keys, the key pair comprising a public key and a private key. Public and private keys are generated based on a mathematical function, and further to estimate a key nearly impossible through a key. Wherein plaintext can be encrypted with a public key, private key and then decrypted to obtain the original plaintext can be encrypted with the private key, public key and then decrypted text. And, in general, the public key for encryption and a private key for digital signature. And the public key is used to encrypt sent someone to send to their own files, while the private key is to retain their own personal use, not for others to use. Note that, after the user A plaintext encrypted by the public key can only be decrypted using the private key of the user A, can not use any other person other than the private key to decrypt A; A user's private key encrypted files can only a's public key to decrypt, you can not use any other person other than the a's public key to decrypt. Because the private key is reserved themselves, not for others to know, therefore, in addition to the private key encryption function, but also can have a digital signature role. The mechanism is: a private key that only you have, others do not have your private key, you can file is signed with the private key, and others the absence of your private key can not be the same signature, so that we can prove that the files are sent out from you. The public key is available to the people you want to and use of secure communications. For example, A wants to communicate with you, but do not want to be seen with someone new content, you can use your public key to encrypt the content sent, and you receive a message sent to the A's after you can use your private key to decrypt, you can read the contents of the file. A send assumed that the content of the way was intercepted, but not your private key, then the same can not see the plaintext. In this way we can achieve PGP encryption and digital signatures. PGP is popular reason is that encryption security is very high, while the encryption speed is quickly.

Associated with PGP encryption, decryption method and PGP key management mechanisms:

Conventional PGP encryption key portion to be used is employed called "session key" (sek). Each time use, PGP are randomly generates a 128-bit IDEA session key used to encrypt the message. Public key encryption technique is public and private keys used to encrypt the session key, and to protect the contents of messages indirectly through it.

PGP public key and a private key stored in the key ring (KEYR) file.

PGP in many places need to use a password, which mainly serve to protect the private key. Because the private key is too long and no rules, it is difficult to remember. PGP encrypts it with the password stored in the key ring, so that the user can easily remember the password indirectly using the private key.

Each of the private PGP encrypted by a corresponding password. PGP user mainly in the need to enter a password 3: When the need to decrypt the encrypted message received, PGP user needs to enter a password, private key to decrypt the information taken out; when the user needs to be a signature file or information, the user enters a password, private key encryption removed ; when the file on disk encryption tradition, requires the user to enter a password

E-mail via open network transmission, other people on the network can monitor or intercept messages, to get the contents of the message, so the message is more security problems highlighted. Protect information from being acquired by a third party, which requires encryption. Another problem is that the authentication information, how to make sure that the message recipient has not been tampered with third parties, which requires a digital signature technology.

 

specific process:

The first step, PGP will prompt the purpose of this guide is to generate a pair of keys, you can use it to encrypt a file or files for digital signatures.

 

 

The second step, if you want to select or choose a different digit key encryption algorithms, click on the "expert" Advanced Options, PGP will ask you to enter the full name and mailing address. Although the real name is not required, but you enter a friend's name can understand, it is best to let you know that other people look, they will want to quickly find the key in the encryption. Select an encryption type. Specify the key length. In general, the greater the likelihood of being declassified smaller number of bits, the more secure, but when performing encryption and decryption will require more time, generally 2048 ok. PGP will ask expiration date of your keys, you can choose to never expire, or specify a date as a limit expired. Otherwise, click "Next."

 

 

The third step, please re-enter your password Passphrase. The password is encrypted with your private key, the private key is not usually open, in case someone else got your private key, not the password, he can not use. Recommended your password is greater than 8, and preferably includes a case, spaces, numbers, punctuation marks, easy to remember that you can use as your key word, such as Amy is 12 years old. And the like. The edge of the "Hide Typing" indicates whether the typed password.

(Passphrase- password, pass phrase, in function, the same passphrase as passwords, but passwords longer than the length of usually 4-5 passphrase used to replace the original digital words, a combination of letters)

 

 

The fourth step, then PGP will spend a little time to generate your keys, it has been the "Next" can be completed.

When you want to abolish the key, you can select Revoke.

 

 

 

analysis:

If you want to send out a letter or document is not false or tampered with, you can sign and encrypt files. As follows: Select the document to be signed, right click and select "sign". Note that, the file signature can only prove that you sent the file, but the contents of the file is not encrypted, the same time, digital signatures, care is to indicate that it is issued from their own here, so for the contents of the file and do not care to be seen, digitally signed documents to be sent with the original plaintext file with the other party, the other party to verify the digital signature is valid. If both here to show documents from their own issue, while also the information confidential file, then select "Signature and Encryption" option Encrypt & sign. Similarly, in the dialog box to select the key from the key list at the top of the dialog box, select the file onto the lower part of the user receives the dialog box, click "OK". After determining the recipient, enter the password for the private key, a digital signature or digital signature and encryption. Recipients use your public key to verify the signature.

 

Experience:

In OE, if the PGPmail for OutLook Express plug-in installed, we can see PGPmail loaded into the toolbar of OE, OE create a new message, check the toolbar "encrypted information (PGP)" and "signature information (PGP) "button is pressed or the state, when finished writing encrypted messages in plain text, fill in the other email address. Click Send, then PGPmail will be encrypted using a master key and the other party of its public key encrypted message can only be used by you and the other to its own private key to decrypt it. PGPkey will find the appropriate public key on the server, so the other key update caused not receive mail information. Click Cancel to Recipient Selection pop-up window, select the recipient, from the top of the list using the mouse double-click Add the following to the list of recipients inside. Click OK, and you can be sent via PGP encrypted messages. Reception: connect to the server and receive PGP encrypted message using Outlook, open, to see is garbled (information PGP encryption), then we click on the PGP icon in the taskbar, in the pop-up menu, click on "current window" - "decrypt & efficacy" in the pop-up window, enter the password you set the key. Will successfully decrypt email messages, and pop-up text viewer window, this time we have seen the decrypted information.

Guess you like

Origin www.cnblogs.com/mutudou/p/11865711.html
Recommended