SlideShare a Scribd company logo
1 of 28
Download to read offline
GPG BASICS
Carlos Perez carlos_perez@darkoperator.com
Friday, September 13, 13
WHAT IS ENCRYPTION?
• Encryption encodes and scrambles data so it is difficult to obtain the
original content unless a known secret is used to decipher it.
• The 2 main schemes of encryption are:
• Symmetric -The same cryptographic key is used for both encryption
and decryption of the data. It is the simplest form of encryption.
• Public Key - Requires two separate keys, a secret key and a public
key.Although different, the two parts of the key pair are
mathematically linked. One key locks or encrypts the data , and the
other unlocks or decrypts the data.
Friday, September 13, 13
Text
Friday, September 13, 13
PGP
• PGP Stands for Pretty Good Privacy.
• It was initially created by Phil Zimmerman in 1991
• In 1997 OpenPGP was proposed to the IETF and in 2007 and
accepted. It is currently RFC4880 http://tools.ietf.org/html/
rfc4880 and it is fo
Friday, September 13, 13
OPENPGP
• The standard covers strong public-key and symmetric cryptography to
provide security services for electronic communications and data storage.
• These services are:
• Confidentiality
• Key management
• Authentication
• Digital signatures
Friday, September 13, 13
GNUPG
• Stands for GNU Privacy Guard http://www.gnupg.org/
• Is a Free (open-source) implementation of the OpenPGP standard.
• The package is separate from any GUI and refers to the Library and
Binary tools.
• Linux - comes with all distributions
• Windows - http://www.gpg4win.org/ (Do NOT use the outlook plugin)
• OS X - https://gpgtools.org/
Friday, September 13, 13
PGP WEB OFTRUST
Friday, September 13, 13
CERTIFICATE AUTHORITY
WEB OFTRUST
Friday, September 13, 13
WHAT PGP/GPG DOES
PROVIDE
• Verification of sender.
• Encryption of data being sent.
• Trust relationship based on reputation of known persons.
• Strong protection of offline data or data at rest at other
location as long as private key is protected.
Friday, September 13, 13
WHAT PGP/GPG DOES NOT
PROVIDE
• Anonymity
• Enumeration of Metadata (Subject, Source, Destination,
Possible software version)
• Enumeration of Relations (People that trust the parties)
Friday, September 13, 13
GENERATING KEYS
• The command to generate the keys is: gpg --gen-key
• Choose key sizes larger than 1024.
• Set an expiration date for the key.
• Set a good passphrase to protect the key.
• To list the key gpg --list-keys "<your name|Email>"
Friday, September 13, 13
GENERATING KEYS
Friday, September 13, 13
GENERATING KEYS
• After generating a key pair create a revocation certificate and
save it in a safe place with gpg --output revoke.asc --
gen-revoke <keyid>
• Revocation certificate is use to revoke your key from key
servers in the case you lost your passphrase.
• A revoked key can still be used to verify old signatures, or
decrypt data, but it cannot be used to encrypt new messages
to you.
Friday, September 13, 13
GENERATING KEYS
• To list secret keys gpg --list-secret-keys
• Create a backup of your private key gpg --export-secret-key
-a "[name|email]" > private.key
• placed the backed up public and private keys in a safe place.
• To restore a private key on another machine:
• gpg --import public.key
• gpg --allow-secret-key-import --import private.key
Friday, September 13, 13
UPLOADYOUR KEYTO A
KEYSERVER
• For first time keys use a key server that verifies the email, this
applies to you and anyone you ask to generate a new key to
communicate with.
• To export a key to a server gpg --keyserver
<keyserver> --send-keys <key ID>
• To export an individual Public key for sharing gpg --armor
--export [email|name] > pubkey.asc
Friday, September 13, 13
UPLOADYOUR KEYTO A KEY
SERVER
• A recommended server is https://keyserver.pgp.com server
will validate the key via the email message in the key and will
ask for periodic confirmation.
Friday, September 13, 13
IMPORTING ANDVERIFYING A
KEY
• To download a key from a key server gpg --keyserver
<keyserver> --recv-keys <key id>
• To import an exported key gpg --import <key file>
• After we import a key the fingerprint should verified to know
if its the one we expected gpg --fingerprint "[email|
name]"
Friday, September 13, 13
IMPORTING ANDVERIFYING A
KEY
• To download a key from a key server gpg --keyserver
<keyserver> --recv-keys <key id>
• To import an exported key gpg --import <key file>
• After we import a key the fingerprint should verified to know
if its the one we expected gpg --fingerprint "[email|
name]"
Friday, September 13, 13
IMPORTING ANDVERIFYING A
KEY
• Once a key is verified you can sign it with our key, for this we
have to edit the key
• gpg --edit-key "[email|name]"
• gpg> sign
Friday, September 13, 13
REMOVING A KEY FROMTHE
KEYRING
• To remove a key a trusted source from the keyring
trustdb.gpg gpg --delete-key “[name|email]”
• To remove a secret key from secring gpg --delete-
secret-key “[name|email]”
Friday, September 13, 13
ENCRYPTING A FILE
• Encrypt symmetrically a file using a password gpg -c
filename
• Decrypt a file using a gpg -d --output <new
filename> filename
• To encrypt a file with a specific public key gpg --output
document.gpg --encrypt --recipient “[email|
name]” document.doc
Friday, September 13, 13
ENCRYPTING A FILE
Friday, September 13, 13
DECRYPTING A FILE
Friday, September 13, 13
SIGNING ANDVERIFYING A
FILE
• To generate a signature for a file gpg --output file.sig --
sign file
• To verify a signature both the sig file and the original file must
be in the same folder gpg --verify file.sig
Friday, September 13, 13
SIGNING ANDVERIFYING A
FILE
Friday, September 13, 13
LEAKINGTO MUCH
INFORMATION
Friday, September 13, 13
DISABLE COMMENT AND
VERSION INFO
• Add to your gpg.conf file the following lines:
• Disables version information
• Sets the comment to an empty string
Text
Friday, September 13, 13
THANKS
Friday, September 13, 13

More Related Content

What's hot

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Key management
Key managementKey management
Key management
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Viewers also liked (7)

GPG Signing Git Commits
GPG Signing Git CommitsGPG Signing Git Commits
GPG Signing Git Commits
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Installing Gpg
Installing GpgInstalling Gpg
Installing Gpg
 
Gpg Twitter
Gpg TwitterGpg Twitter
Gpg Twitter
 
Gnu Privacy Guard - Intro
Gnu Privacy Guard - IntroGnu Privacy Guard - Intro
Gnu Privacy Guard - Intro
 
PGP - Pretty Good Privacy
PGP - Pretty Good PrivacyPGP - Pretty Good Privacy
PGP - Pretty Good Privacy
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 

Similar to Gpg basics

Similar to Gpg basics (20)

email.ppt
email.pptemail.ppt
email.ppt
 
Email2
Email2Email2
Email2
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
 
Berlinsides2017
Berlinsides2017Berlinsides2017
Berlinsides2017
 
Mulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography ModuleMulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography Module
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
 
Mule security - pgp
Mule  security - pgpMule  security - pgp
Mule security - pgp
 
Mule security - pgp
Mule  security - pgpMule  security - pgp
Mule security - pgp
 
Mule security - pgp
Mule  security - pgpMule  security - pgp
Mule security - pgp
 
Crypto hlug
Crypto hlugCrypto hlug
Crypto hlug
 
Linux securities
Linux securitiesLinux securities
Linux securities
 
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 Pgsodium's Features: those not provided by pgcrypto and integration with rem... Pgsodium's Features: those not provided by pgcrypto and integration with rem...
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 
CryptoGraphy Module in Mulesoft
CryptoGraphy Module in MulesoftCryptoGraphy Module in Mulesoft
CryptoGraphy Module in Mulesoft
 
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptographyAhmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
 
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
 
Email Security with OpenPGP - An Appetizer
Email Security with OpenPGP - An AppetizerEmail Security with OpenPGP - An Appetizer
Email Security with OpenPGP - An Appetizer
 
Cryptography
CryptographyCryptography
Cryptography
 
Automating Enterprise Wireless Deployments
Automating Enterprise Wireless DeploymentsAutomating Enterprise Wireless Deployments
Automating Enterprise Wireless Deployments
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Gpg basics

  • 1. GPG BASICS Carlos Perez carlos_perez@darkoperator.com Friday, September 13, 13
  • 2. WHAT IS ENCRYPTION? • Encryption encodes and scrambles data so it is difficult to obtain the original content unless a known secret is used to decipher it. • The 2 main schemes of encryption are: • Symmetric -The same cryptographic key is used for both encryption and decryption of the data. It is the simplest form of encryption. • Public Key - Requires two separate keys, a secret key and a public key.Although different, the two parts of the key pair are mathematically linked. One key locks or encrypts the data , and the other unlocks or decrypts the data. Friday, September 13, 13
  • 4. PGP • PGP Stands for Pretty Good Privacy. • It was initially created by Phil Zimmerman in 1991 • In 1997 OpenPGP was proposed to the IETF and in 2007 and accepted. It is currently RFC4880 http://tools.ietf.org/html/ rfc4880 and it is fo Friday, September 13, 13
  • 5. OPENPGP • The standard covers strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. • These services are: • Confidentiality • Key management • Authentication • Digital signatures Friday, September 13, 13
  • 6. GNUPG • Stands for GNU Privacy Guard http://www.gnupg.org/ • Is a Free (open-source) implementation of the OpenPGP standard. • The package is separate from any GUI and refers to the Library and Binary tools. • Linux - comes with all distributions • Windows - http://www.gpg4win.org/ (Do NOT use the outlook plugin) • OS X - https://gpgtools.org/ Friday, September 13, 13
  • 7. PGP WEB OFTRUST Friday, September 13, 13
  • 9. WHAT PGP/GPG DOES PROVIDE • Verification of sender. • Encryption of data being sent. • Trust relationship based on reputation of known persons. • Strong protection of offline data or data at rest at other location as long as private key is protected. Friday, September 13, 13
  • 10. WHAT PGP/GPG DOES NOT PROVIDE • Anonymity • Enumeration of Metadata (Subject, Source, Destination, Possible software version) • Enumeration of Relations (People that trust the parties) Friday, September 13, 13
  • 11. GENERATING KEYS • The command to generate the keys is: gpg --gen-key • Choose key sizes larger than 1024. • Set an expiration date for the key. • Set a good passphrase to protect the key. • To list the key gpg --list-keys "<your name|Email>" Friday, September 13, 13
  • 13. GENERATING KEYS • After generating a key pair create a revocation certificate and save it in a safe place with gpg --output revoke.asc -- gen-revoke <keyid> • Revocation certificate is use to revoke your key from key servers in the case you lost your passphrase. • A revoked key can still be used to verify old signatures, or decrypt data, but it cannot be used to encrypt new messages to you. Friday, September 13, 13
  • 14. GENERATING KEYS • To list secret keys gpg --list-secret-keys • Create a backup of your private key gpg --export-secret-key -a "[name|email]" > private.key • placed the backed up public and private keys in a safe place. • To restore a private key on another machine: • gpg --import public.key • gpg --allow-secret-key-import --import private.key Friday, September 13, 13
  • 15. UPLOADYOUR KEYTO A KEYSERVER • For first time keys use a key server that verifies the email, this applies to you and anyone you ask to generate a new key to communicate with. • To export a key to a server gpg --keyserver <keyserver> --send-keys <key ID> • To export an individual Public key for sharing gpg --armor --export [email|name] > pubkey.asc Friday, September 13, 13
  • 16. UPLOADYOUR KEYTO A KEY SERVER • A recommended server is https://keyserver.pgp.com server will validate the key via the email message in the key and will ask for periodic confirmation. Friday, September 13, 13
  • 17. IMPORTING ANDVERIFYING A KEY • To download a key from a key server gpg --keyserver <keyserver> --recv-keys <key id> • To import an exported key gpg --import <key file> • After we import a key the fingerprint should verified to know if its the one we expected gpg --fingerprint "[email| name]" Friday, September 13, 13
  • 18. IMPORTING ANDVERIFYING A KEY • To download a key from a key server gpg --keyserver <keyserver> --recv-keys <key id> • To import an exported key gpg --import <key file> • After we import a key the fingerprint should verified to know if its the one we expected gpg --fingerprint "[email| name]" Friday, September 13, 13
  • 19. IMPORTING ANDVERIFYING A KEY • Once a key is verified you can sign it with our key, for this we have to edit the key • gpg --edit-key "[email|name]" • gpg> sign Friday, September 13, 13
  • 20. REMOVING A KEY FROMTHE KEYRING • To remove a key a trusted source from the keyring trustdb.gpg gpg --delete-key “[name|email]” • To remove a secret key from secring gpg --delete- secret-key “[name|email]” Friday, September 13, 13
  • 21. ENCRYPTING A FILE • Encrypt symmetrically a file using a password gpg -c filename • Decrypt a file using a gpg -d --output <new filename> filename • To encrypt a file with a specific public key gpg --output document.gpg --encrypt --recipient “[email| name]” document.doc Friday, September 13, 13
  • 22. ENCRYPTING A FILE Friday, September 13, 13
  • 23. DECRYPTING A FILE Friday, September 13, 13
  • 24. SIGNING ANDVERIFYING A FILE • To generate a signature for a file gpg --output file.sig -- sign file • To verify a signature both the sig file and the original file must be in the same folder gpg --verify file.sig Friday, September 13, 13
  • 27. DISABLE COMMENT AND VERSION INFO • Add to your gpg.conf file the following lines: • Disables version information • Sets the comment to an empty string Text Friday, September 13, 13