SlideShare a Scribd company logo
1 of 11
Encrypting emails using
Step 1:Installing Kleopatra PGP Step 2: Creating your own certificate
Step 2:Completing personal information
Step 2: Creating your passphrase
Step 3: Exporting your Certificate  and your Secret key
Step 4 : Importing  your recipient certificate from file or server
Step 5: Ataching your secret key and your certificate into email
Step 6 : Encrypting your message
Step 6: Encrypting your message
Step 7 : Sending the email
Encrypting emails using Kleopatra PGP ,[object Object],[object Object],[object Object]

More Related Content

What's hot

E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)Pankaj Bhambhani
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyAdri Jovin
 
Criptografia - Asimetrica - RSA
Criptografia - Asimetrica - RSACriptografia - Asimetrica - RSA
Criptografia - Asimetrica - RSAG Hoyos A
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithmAbhishek Kesharwani
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 

What's hot (20)

E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
ElGamal Encryption in Go
ElGamal Encryption in GoElGamal Encryption in Go
ElGamal Encryption in Go
 
Criptografia - Asimetrica - RSA
Criptografia - Asimetrica - RSACriptografia - Asimetrica - RSA
Criptografia - Asimetrica - RSA
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
Steganography
Steganography Steganography
Steganography
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Digital Signature.ppt
Digital Signature.pptDigital Signature.ppt
Digital Signature.ppt
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Unit - 4.pptx
Unit - 4.pptxUnit - 4.pptx
Unit - 4.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 

More from Lupu Cosmin

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftLupu Cosmin
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windowsLupu Cosmin
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuLupu Cosmin
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca MagnifierLupu Cosmin
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs FeedbackLupu Cosmin
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to knowLupu Cosmin
 

More from Lupu Cosmin (9)

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by Microsoft
 
lupucosmin
lupucosminlupucosmin
lupucosmin
 
Dia
DiaDia
Dia
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windows
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntu
 
Diac in ym
Diac in ymDiac in ym
Diac in ym
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca Magnifier
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs Feedback
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to know
 

Encrypting emails using Kleopatra PGP