Tuesday, 21 July 2015

How to Encrypt files on centos6/Rhel/Fedora

How to Encrypt files on centos6/Rhel/Fedora

GNU Privacy Guard (GnuPG) is the backend encryption engine.

Before you can use Gnupg you need to create key pair by "gpg --gen-key"

#gpg --gen-key

gpg (GnuPG) 2.0.14; Copyright (C) 2009 Free Software Foundation, Inc.

This is free software: you are free to change and redistribute it.

There is NO WARRANTY, to the extent permitted by law.

Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)

Your selection? 1

RSA keys may be between 1024 and 4096 bits long.

What keysize do you want? (2048) 1024

Requested keysize is 1024 bits

Please specify how long the key should be valid.

         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years

Key is valid for? (0) 2

Key expires at Fri 24 Jul 2015 10:58:51 AM IST
Is this correct? (y/N) y

GnuPG needs to construct a user ID to identify your key.

Real name: shaurya

Email address: xxxxxxxxxx

Comment:xxxxxxxxxxxxxx

You selected this USER-ID:
    "shaurya (xxxxxxxxxxxxxxx) <xxxxxxxxxx>"

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o

You need a Passphrase to protect your secret key.

gpg: problem with the agent: Not implemented

We need to generate a lot of random bytes. It is a good idea to perform

some other action (type on the keyboard, move the mouse, utilize the

disks) during the prime generation; this gives the random number

generator a better chance to gain enough entropy.

We need to generate a lot of random bytes. It is a good idea to perform

some other action (type on the keyboard, move the mouse, utilize the

disks) during the prime generation; this gives the random number

generator a better chance to gain enough entropy.

gpg: key 44759702 marked as ultimately trusted

public and secret key created and signed.

gpg: checking the trustdb

gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model

gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u

gpg: next trustdb check due at 2015-07-24

pub   1024R/44759702 2015-07-22 [expires: 2015-07-24]

      Key fingerprint = 06EE 569F DC55 18F0 4E4C  16E3 64D6 389C 4475 9702

uid                  shaurya (xxxxxxxxxxx) <xxxxxxxxxxxxxxx>

sub   1024R/45D6A561 2015-07-22 [expires: 2015-07-24]

To encrypt "gpg --encrypt --default-recipient-self filename"

[root@sk ~]# gpg --encrypt --default-recipient-self test.txt

 

And this will create filename.gpg which is encrypted.

No comments:

Post a Comment