0% found this document useful (0 votes)
168 views4 pages

Exp 8 - GPG - D12B - 74 PDF

Experiment 8 explores using GPG to implement email security. GPG uses public key encryption, where a user generates both a private key and public key. The private key is kept secret while the public key can be shared. This allows the user to sign messages with the private key to prove identity and integrity, and encrypt messages with a recipient's public key to provide secrecy so only they can decrypt it with their private key. The experiment demonstrates installing GPG, generating a key pair, choosing an algorithm and key size, setting key validity and a user ID, and concludes that GPG provides authentication and privacy for email messages over the internet.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views4 pages

Exp 8 - GPG - D12B - 74 PDF

Experiment 8 explores using GPG to implement email security. GPG uses public key encryption, where a user generates both a private key and public key. The private key is kept secret while the public key can be shared. This allows the user to sign messages with the private key to prove identity and integrity, and encrypt messages with a recipient's public key to provide secrecy so only they can decrypt it with their private key. The experiment demonstrates installing GPG, generating a key pair, choosing an algorithm and key size, setting key validity and a user ID, and concludes that GPG provides authentication and privacy for email messages over the internet.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Experiment 8

Aim​: Explore the GPG tool of linux to implement email security


Theory ​: ​GnuPG is a complete and free implementation of the OpenPGP standard. GnuPG
allows you to encrypt and sign your data and communications; it features a versatile key
management system, along with access modules for all kinds of public key directories.​GnuPG
stands for GNU Privacy Guard.

GPG uses public key encryption wherein you create a key pair: one private or secret key you
keep to yourself and one public key you share with your correspondents or the world. The
important part of this two-key system is that neither key can be calculated by having the other.
They are each an independent and necessary part of the system and are based upon solid
mathematical foundations.

This setup allows you to


1) Use your private key to sign a document to provide identification and message integrity
to a recipient who has your public key.
2) Identification means the recipient can be certain that the document came from you
3) Message integrity means the recipient knows the message has not been altered.
You can provide these features because only you have your private key. Use the recipient’s
public key to encrypt a document and provide secrecy.Secrecy means that only the recipient
(who has the corresponding private key) can decrypt the document.Combine these steps to
provide identification, message integrity, and secrecy (i.e., only the recipient can decrypt the
document, the recipient knows the document came from you, and the recipient knows the
document was not altered)
Steps to Encrypt and Decrypt :
1) Installation of GNU PG
# apt-get install gnupg
2) The first step to use GnuPg is to create the public and private key pairs. The following
command is used to create the keys.
$ gpg --gen-key
3) Choose the algorithm to be used for key generation
(1) RSA and RSA (default)
(2) DSA and Elgamal
(3) DSA (sign only)
(4) RSA (sign only)
4) Select the key size
Once the algorithm is selected, it will ask for the key size.
RSA keys may be between 1024 and 4096 bits long.
5) Key validity
The next input we need to provide is how long does the key is valid.
6) Create User ID and Password
Each key will be mapped with a user id and password. Now it asks for your name, E-Mail
and passphrase

Conclusion : ​GPG is used for authentication and privacy to messages over the internet. GPG
was originated to address the security concerns of plain e-mail or text messages. Gnupg is used
to demonstrate usage of GPG.
Output :

You might also like