Encrypt and decrypt files using GPG
Goal: Encrypt files using GPG
Distribution: Applies to any distribution
Requirements: Linux with GPG installed or root privileges to install it.
Difficulty: Easy
Promise:
- # - You need to use root permissions to execute the specified command. You can directly use the root user to execute it, or you can use sudocommand
- $ - You can use ordinary users to execute specified commands
Encryption is very important. It is essential to protect sensitive information. Your private files should be encrypted, and GPG provides a great solution.
GPG is widely used. You can find it in almost every distribution's repository. If you haven't installed it yet, do it now.
Debian/Ubuntu
$ sudo apt install gnupg
Fedora
# dnf install gnupg2
Arch
# pacman -S gnupg
Gentoo
# emerge --ask app-crypt/gnupg
You need a key pair to encrypt and decrypt files. If you have already generated a key pair for SSH, you can use it directly. If not, GPG includes tools to generate a key pair.
$ gpg --full-generate-key
GPG has a command line program that can help you generate keys step by step. It also has a much simpler tool, but this tool does not let you set the key type, key length, and expiration time, so this tool is not recommended.
GPG will first ask you for the type of key. If there is nothing special, just choose the default value.
The next step is to set the key length. 4096 is a good choice.
After that, you can set the expiration date. Set to 0 if you want the key to never expire.
Then, enter your name.
Finally, enter your email address.
You can also add a comment if you need.
After all this is completed, GPG will ask you to verify the information.
GPG will also ask you if you need to set a password for the key. This step is optional, but will increase the level of protection. If you need to set a password, GPG will collect your operation information to increase the robustness of the key. Once all of this is complete, GPG will display information about the key.
Now that you have your own key, encrypting your files is very simple. Use the following command to create a blank text file in the /tmp directory.
$ touch /tmp/test.txt
Then encrypt it with GPG. Here the -e flag tells GPG that you want to encrypt the file, and the -r flag specifies the recipient.
$ gpg -e -r "Your Name" /tmp/test.txt
GPG needs to know the recipient and sender of this file. Since this file is yours, there is no need to specify the sender, and the recipient is yourself.
After you receive the encrypted file, you need to decrypt it. You do not need to specify a key for decryption. This information is encoded in the file. GPG will try to decrypt it using the key inside.
$ gpg -d /tmp/test.txt.gpg
假设你需要发送文件给别人。你需要有接收者的公钥。 具体怎么获得密钥由你自己决定。 你可以让他们直接把公钥发送给你, 也可以通过密钥服务器来获取。
收到对方公钥后,导入公钥到 GPG 中。
$ gpg --import yourfriends.key
这些公钥与你自己创建的密钥一样,自带了名称和电子邮件地址的信息。 记住,为了让别人能解密你的文件,别人也需要你的公钥。 因此导出公钥并将之发送出去。
gpg --export -a "Your Name" > your.key
现在可以开始加密要发送的文件了。它跟之前的步骤差不多, 只是需要指定你自己为发送人。
$ gpg -e -u "Your Name" -r "Their Name" /tmp/test.txt
就这样了。GPG 还有一些高级选项, 不过你在 99% 的时间内都不会用到这些高级选项。 GPG 就是这么易于使用。你也可以使用创建的密钥对来发送和接受加密邮件,其步骤跟上面演示的差不多, 不过大多数的电子邮件客户端在拥有密钥的情况下会自动帮你做这个动作。
The above is the detailed content of Encrypt and decrypt files using GPG. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



How to use Docker Desktop? Docker Desktop is a tool for running Docker containers on local machines. The steps to use include: 1. Install Docker Desktop; 2. Start Docker Desktop; 3. Create Docker image (using Dockerfile); 4. Build Docker image (using docker build); 5. Run Docker container (using docker run).

Docker process viewing method: 1. Docker CLI command: docker ps; 2. Systemd CLI command: systemctl status docker; 3. Docker Compose CLI command: docker-compose ps; 4. Process Explorer (Windows); 5. /proc directory (Linux).

Troubleshooting steps for failed Docker image build: Check Dockerfile syntax and dependency version. Check if the build context contains the required source code and dependencies. View the build log for error details. Use the --target option to build a hierarchical phase to identify failure points. Make sure to use the latest version of Docker engine. Build the image with --t [image-name]:debug mode to debug the problem. Check disk space and make sure it is sufficient. Disable SELinux to prevent interference with the build process. Ask community platforms for help, provide Dockerfiles and build log descriptions for more specific suggestions.

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

The reasons for the installation of VS Code extensions may be: network instability, insufficient permissions, system compatibility issues, VS Code version is too old, antivirus software or firewall interference. By checking network connections, permissions, log files, updating VS Code, disabling security software, and restarting VS Code or computers, you can gradually troubleshoot and resolve issues.

VS Code is available on Mac. It has powerful extensions, Git integration, terminal and debugger, and also offers a wealth of setup options. However, for particularly large projects or highly professional development, VS Code may have performance or functional limitations.

VS Code is the full name Visual Studio Code, which is a free and open source cross-platform code editor and development environment developed by Microsoft. It supports a wide range of programming languages and provides syntax highlighting, code automatic completion, code snippets and smart prompts to improve development efficiency. Through a rich extension ecosystem, users can add extensions to specific needs and languages, such as debuggers, code formatting tools, and Git integrations. VS Code also includes an intuitive debugger that helps quickly find and resolve bugs in your code.

How to back up VS Code configurations and extensions? Manually backup the settings file: Copy the key JSON files (settings.json, keybindings.json, extensions.json) to a safe location. Take advantage of VS Code synchronization: enable synchronization with your GitHub account to automatically back up all relevant settings and extensions. Use third-party tools: Back up configurations with reliable tools and provide richer features such as version control and incremental backups.
