1 Protektor Services Windows Manual 11.5 File and encryption with GPG4win & Enigmail
2 Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the Protektor Services manual series. Protektor Services wants to assist by providing the right tools to help the people that need them without keeping them in the dark on how things actually work. Protektor Services manual series aims to do this by: Creating user friendly manuals Providing manuals for all major operating systems, it doesn't matter if you use Windows, Apple or Linux. Using only open source or open standards based software and solutions. Releasing the manuals under the Creative Commons Attribution 3.0 Unported License. Intermittent updates to the manuals to keep them current with real life computer systems. Making the source-file of the manuals available on request. In case you have any questions about the manuals do not hesitate to contact me. If you or your organization would like customized manuals or want to receive a full training for your people, do not hesitate to contact me Tom Contact Skype: Website: GPG Key: or tomkeunen Acknowledgements I want to thank Nikki for the patience while I am thinking about computer stuff during social time. Legals All trademarks belong to their respected owners. No ownership is claimed by the author. License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
3 Good things to remember Keep your system up to date. Keep your programs up to date. Choose a strong password. Create a user account for daily use. Use anti-virus software Do not forget to make regular backups.
4 Product Information Website: Version: System: License: , Released on March 15, 2011 Windows 2000/XP/Vista/7 Open Source Website: Version: System: License: , Released on June 29, 2010 Windows, Requires Thunderbird Open Source, MPL/GPLv2 What is GPG4win, Enigmail? The makers of GPG4win aim to maintain an up-to-date collection of tools to give the user all the right software for managing keys and encrypting/decrypting text and files. Enigmail is an extension for the Thunderbird client that provides the encryption, decryption and signing functionality. Why use GPG4win, Enigmail? GPG4win is a Windows collection of software and manuals that replaces the commercial PGP suite. Enigmail will give you access to all the cryptographic features you require for . How GPG4win, Enigmail work? GPG4win is an installer package that automates the installation of other programs, it makes installations much more user friendly. GPG4win contains more packages but in this manual you will use: GnuPG The core of the suite, GnuPG is the program that deals with the actual cryptographic features for files but also for Enigmail. Kleopatra Kleopatra is the front-end for GnuPG. It acts as the main key manager. Via an icon in the task bar the user gets access to different functions like encrypting and decrypting of text. GPGEx GPGEx is used for encrypting/decrypting files, you access it by right clicking on a file. The enigmail will be installed from within Thunderbird after we have set up GPG4win.
5 Keys? Symmetric Key Symmetric keys (also known as single-key algorithms) are encryption schemes where one key is being used for encrypting and decrypting. Asymmetric Key Asymmetric cryptography or Public Key cryptography is a design based on the use of a private key and a public key. Both keys are necessary to complete the process of encrypting and decrypting. An easy way to think about it is comparing it to your phone. In order to receive calls you have to give out your telephone number (your public key) but to receive a call you need your phone (your private key). How to use GPG4win? Download the installation package from the website and when finished double click on the icon to install. The installation process is straight forward, the default settings are the correct ones most of the time, the only 2 times you have to interact are in the components page Deselect the checkbox next to GPGOL if you are not using the Outlook client. Click on Next to continue with the installation.
6 And when the Define trustable root certificates page comes up. Select the checkbox that you want to skip the configuration. This part of the installer deals with S/mime certificates which is outside the scope of this manual. Click next to continue. The installation process is finished.
7 Start Kleopatra from the programs list. The main window for key management will appear. If you already have a GPG key you can import it by clicking on the Import certificates icon. If you don't have a key yet please continue.
8 Click on the File menu and select New Certificate. The Certificate Creation Wizard will guide you through the process. Select Create a personal OpenPGP key pair. Click on Next to continue.
9 The next step is to provide your details. Enter your Name and your address. The address has to be the same as your program sends out or there might be verification issues with your key pair making it harder to use. Click on Next to continue. You are presented with the details for your certificate, check them carefully. If the details are correct, click on Create Key.
10 You will need to enter a passphrase. Make sure that you choose a strong passphrase. The wizard will provide some visual help in the form of a quality bar to measure the strength of your chosen passphrase. If you choose a passphrase too short, or not complicated enough, the wizard will kindly offer you a chance to create a stronger passphrase.
11 You will be asked to re-enter the passphrase. Click on Ok to continue. The key creation is now finished. After your key pair Is created you should make a back up of it. From this window you can also send it to a key server. When you are finished click on Finish to continue. Your key is now ready to be used.
12 Now that we have created a key pair, let's export your public key so people can communicate with you in a more secure way. Select your key, click on File and select Export Certificates. Give it a more human readable name and for compatibility issues the.asc extension. Click on Save to continue.
13 If you want to send encrypted files to anybody else you will need their public key. To import this key go to the Kleopatra main window. You can now drag and drop the key file into the main window or select Import Certificates. Browse to where the key you want to import is located. Select it and click on Open.
14 Kleopatra will present you with a window to let you know you know the import process was successful. Click on Ok to close the window. The key has been imported but is not quite ready to be used. Select the key in the Imported Certificates tab from the Kleopatra main window, click on the Certificates menu and then select Change Owner Trust. The web of trust is important when you use GPG. Read the different trust levels and select accordingly. When you have selected the right level of trust, click on OK. Kleopatra will let you know that the Trust level has changed.
15 Next we will certify the key. Go back to the main window of Kleopatra. Select the key you wish to certify and click on the certificates menu and select Certify certificate. Select the checkbox for the key you want to certify. Verify the fingerprint with the user and click on Next.
16 The next window will let you choose the certificate you want to use to certify. Click on Certify to continue. You will be asked to enter your passphrase. After you entered your passphrase click on OK. Kleopatra will let you know that the certification was successful. Click on Finish to continue.
17 If you know go to the main Kleopatra and select Trusted Certificates tab you will see that the key you just imported is now trusted and ready to be used. Next you will encrypt a file to share with the person you just imported the key from. Go to document you wish to encrypt, right click with your mouse on the file and in the menu you will see the option to Sign and encrypt.
18 This process only takes a few mouse clicks. Select Sign and Encrypt and click on Next. The signing part of this process is part of what makes up the web of trust.
19 Next you will have to select the keys you want to use to encrypt this file. Select the key(s), and click on Add. They will be added to the bottom box and when finished selecting the keys, click on Next.
20 Select the identity you want to sign the file with. Click on Sign & Encrypt to continue. You will need to enter your passphrase. After entering your passphrase click on OK.
21 GPG will now perform the signing and encrypting. You will be presented with a window to inform you of the operations. Click on Finish to continue. Your encrypted document is now ready to be shared with your contact. As you can see the filename is not encrypted, be aware of this when choosing a filename so you don't divulge any information that might be sensitive.
22 When you receive an encrypted file and you need to decrypt it the process is even easier. Select the file you want to decrypt, right click and select decrypt and verify from the menu. Kleopatra will give you some options what you can do with the file. Click on Decrypt/Verify to continue. You will need to enter your passphrase. When finished, click on OK.
23 You will get the status report from Kleopatra. Click OK to continue. Your file is now decrypted. That is all it takes to import keys, to encrypt and decrypt files with GPG4win. This method is suitable for when you want to share files via removable media such as a USB stick. You can also send this encrypted document via . Next we will be looking at encrypting and decrypting . For this manual we will work with the Thunderbird client. If you use another client, chances are that there is a GPG extension available for it that will make it also easy to use. This manual will not go into depth on how to install and configure thunderbird but will focus on using the GPG cryptographic features in a user friendly way. There are many great tutorials available in the internet for general Thunderbird use.
24 First we will need to install the Enigmail extension. Start Thunderbird and select the Tools menu and click on Add-ons. The Add on menu will appear and search for Enigmail. When found, click on Add to Thunderbird.
25 Thunderbird will warn you about potential malicious practices. Click on Install Now to continue. Thunderbird will do the installation and when finished ask you to restart Thunderbird. Click on Restart Thunderbird to continue.
26 Once restarted you will see you now have an OpenPGP menu in Thunderbird. But first we will enable your account to make use of the new features. Select the Tools menu and click on Account settings.
27 Select the OpenPGP security tab. Select the checkbox to Enable OpenPGP support for this identity. Tick the Use specific OpenPGP key and click on Select Key.
28 A window will appear that will allow you to select the key you want to use. Select the key and click on OK. You will now return to your Account settings window. Click Ok to close. Your account is now ready to be used. Return to the main window of Thunderbird. Click on Write to start composing a new message that you will encrypt.
29 Create your message as usual. Before sending your message click on the OpenPGP button in the menu. Select Sign Message and Encrypt Message. For more options such as attaching your public key you can also select the OpenPGP menu.
30 Nothing seems to have happened. But at the bottom you will see the sign and encrypt buttons are now active. You will be asked to enter your passphrase. When finished, click on OK. When you created your key, the importance of using the right address was pointed out. Here you can see why this is. Enigmail will check the recipients' address against the addresses it has associated with the keys and use the corresponding keys.
31 Let's write another message but with an address for the recipient different then the one he or she created their public key with. As before select the sign and encrypt. Since Enigmail doesn't know one of the recipients it will ask you to select the keys you want to use for the signing and encryption of the . You can now select the key you want to use to encrypt the message. Press OK when finished.
32 Decrypting a received encrypted message. Select the message. You will see a lot of djibberish on the screen but Enigmail will pick up that this is actually an encrypted message and ask for your passphrase for decryption. Enter your passphrase and click on OK. Your message will now be decrypted.
33 The decrypted message. That is all there is to do to send and receive encrypted messages. If you want to send attachments to your contacts you can either send previously encrypted files or you can let Enigmail take care of this.
34 Write your and attach the files you want to send as usual, select the encrypt option from the OpenPGP button in the menu and when you select send Enigmail will present you with the following options. Select the appropriate action and press Ok to send your message with the attachments encrypted.
GPG4win / Kleopatra Documentation Secure file and e-mail encryption by using GnuPG for Windows GPG4win Detailed How To: Installing Gpg4win: 1. Go to the following website http://www.gpg4win.org/download.html,
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
Encrypting your Email Communications using PGP If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following
GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
Encrypting IRD RWT/NRWT certificate files with Gpg4win This document outlines the details for installing Gpg4win, importing the IRD public key for encrypting files, and encrypting your RWT/NRWT certificates.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
FRCC Secure Transfer & Storage Infrastructure Training for new data transfer process Training Objects Understand the changes in regards to the data transfer process using PKI Installation Key management
openpgp email security for mozilla applications The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. Enigmail Handbook
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
Technology Help Desk 412 624-HELP  http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
THUNDERBIRD WORKBOOK 1 2 Published : 2012-05-25 License : None INTRODUCTION 1. ABOUT THIS WORKBOOK 2. INTRODUCTION TO THUNDERBIRD 3 1. ABOUT THIS WORKBOOK T his workbook is designed to complete specific
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.
Email Account Create for Outlook Express Click Start Menu Choose Outlook Express Click Tools menu from Menu Bar and then click Accounts In Internet Account Wizard, Click Add Button and Click Mail. 1 In
Topic Name of the Trainer/Speaker Professional Position and Name of Organization Email TLS/SSL : Securing your website PGP : Secure your email communication Mohammad Fakrul Alam CTO bdhub Limited email@example.com
This document provides information on the following topics: Email Encryption set-up Outlook 2003 Email Encryption set-up Outlook 2007 Email Encryption set-up Outlook 2010 Email Encryption set-up Outlook
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
End-User Certificate Management Note: The remote VPN client must download the VPN Client software version 5.1.3 before using Authentication Service. The SonicWALL Authentication Service requires the remote
Secure e-mail transaction guidelines for external users with Commission personnel. This document describes in general the basic requirements to set up secure (encrypted) e- mail communication between external
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH firstname.lastname@example.org Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Instruction Manual for BicDroid QDocument (Basic, Premium, and Professional Editions) Version 1.1 BicDroid.com TABLE OF CONTENTS Installation... 1 Registration. 2 Verification Code 5 Using BicDroid QDocument
Getting a Free Comodo Email Certificate Go here and click on Get It Free Now button. http://www.instantssl.com/ssl certificate products/free email certificate.html It will take you to this form which you
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
Encrypting Your Email Using the free COMODO Secure Email Certificate These instructions will guide you through the process of getting a free Secure Email Certificate Issued by COMODO. This document will
Steganos Secure E-Mail Step by Step Instructions Introduction Although more and more PC users learn that an e-mail can be read by a third party as easily as a postcard, e-mail encryption is still quite
ElkhartNet, Inc. is dedicated to providing our email customers with excellent service and support. In a targeted effort to reduce SPAM and to provide more secure and faster email, we are changing our outgoing
BackupVault / Attix5 Server Quickstart Guide This document takes about 5 minutes to read and will show you how to: Download the software Install the Attix5 Professional Backup software Backup your files
Microsoft Access Rollup Procedure for Microsoft Office 2007 Note: You will need tax form information in an existing Excel spreadsheet prior to beginning this tutorial. 1. Start Microsoft access 2007. 2.
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
Select Correct USB Driver Windows often installs updated drivers automatically, and defaults to this latest version. Not all of these drivers are compatible with our software. If you are experiencing communications
FRCC Secure Data Transfer Users Guide V1.0 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
Digital Signatures This tutorial was designed to help you learn to use digital signatures for signing PDF forms with Adobe Acrobat. This tutorial covers: how to create a digital signature, how to customize
Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.btconline.net mail (default) Click on Properties button Click on the General tab User Information
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
IceWarp Unified Communications The IceWarp SSL Certificate Process Version 10.3 Printed on 26 November, 2010 Contents The IceWarp SSL Certificate Process 1 Choosing the Proper Certificate Type... 2 Creating
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.nefcom.net (default) Click on Properties button Click on the General tab User Information E-mail
Signing and Encryption with GnuPG Steve Revilak http://www.srevilak.net/wiki/talks Cryptoparty @ Somerville Public Library January 10, 2015 1 / 20 What is GnuPG? GnuPG is a free software implementation
How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
Guide Installing Digital Certificates in Outlook 2000 Document SIGNE_PAPET. Ver. 1.0 Date of application 06/08/2012 Seguridad documental 2 Introduction This document describes the steps for configuring
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
Using TLS Encryption with Microsoft Outlook 2007 This guide is meant to be used with Microsoft Outlook 2007. While the instructions are similar, the menu layouts and options have changed since the previous
IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: email@example.com www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL WINDOW LIVE MAIL (VISTA) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled