How to Encrypt files on centos6/Rhel/Fedora
GNU Privacy Guard (GnuPG) is the backend encryption engine.
Before you can use Gnupg you need to create key pair by "gpg --gen-key"
Before you can use Gnupg you need to create key pair by "gpg --gen-key"
#gpg --gen-key
gpg (GnuPG) 2.0.14; Copyright (C) 2009 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elgamal
(3) DSA (sign only)
(4) RSA (sign only)
Your selection? 1
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 1024
Requested keysize is 1024 bits
Please specify how long the key should be valid.
0 = key does not expire
<n> = key expires in n days
<n>w = key expires in n weeks
<n>m = key expires in n months
<n>y = key expires in n years
Key is valid for? (0) 2
Key expires at Fri 24 Jul 2015 10:58:51 AM IST
Is this correct? (y/N) y
GnuPG needs to construct a user ID to identify your key.
Is this correct? (y/N) y
GnuPG needs to construct a user ID to identify your key.
Real name: shaurya
Email address: xxxxxxxxxx
Comment:xxxxxxxxxxxxxx
You selected this USER-ID:
"shaurya (xxxxxxxxxxxxxxx) <xxxxxxxxxx>"
"shaurya (xxxxxxxxxxxxxxx) <xxxxxxxxxx>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
You need a Passphrase to protect your secret key.gpg: problem with the agent: Not implemented
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key 44759702 marked as ultimately trusted
public and secret key created and signed.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: next trustdb check due at 2015-07-24
pub 1024R/44759702 2015-07-22 [expires: 2015-07-24]
Key fingerprint = 06EE 569F DC55 18F0 4E4C 16E3 64D6 389C 4475 9702
uid shaurya (xxxxxxxxxxx) <xxxxxxxxxxxxxxx>
sub 1024R/45D6A561 2015-07-22 [expires: 2015-07-24]
To encrypt "gpg --encrypt --default-recipient-self filename"
[root@sk ~]# gpg --encrypt --default-recipient-self test.txt
And this will create filename.gpg which is encrypted.
No comments:
Post a Comment