Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014



Similar documents
GPG installation and configuration

WiMAX Public Key Infrastructure (PKI) Users Overview

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

LiteCommerce Advanced Security Module. Version 2.8

GPG Tutorial. 1 Introduction. 2 Creating a signing and encryption keys. 3 Generating a revocation certicate. Andreas Hirt July 12, 2009

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

The GNU Privacy Handbook

CLIENT DATABASE SECURITY

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

Please note that a username and password will be made available upon request. These are necessary to transfer files.

Overview Keys. Overview

How to use PGP Encryption with iscribe

GPG4win / Kleopatra Documentation. Secure file and encryption by using GnuPG for Windows

Internet Programming. Security

GPG - GNU Privacy Guard

File and encryption with GPG4win & Enigmail

Encrypting and signing

Pretty Good Privacy with GnuPG

Networks & Security Course. Web of Trust and Network Forensics

1.2 Using the GPG Gen key Command

Discovering OpenPGP Card

Signing and Encryption with GnuPG

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

Encrypting your Communications using PGP

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Signing and Encryption with GnuPG

XCOM File Transfer. Specification

PDG Software. Encryption Guide

INTRODUCTION TO CRYPTOGRAPHY

PGP from: Cryptography and Network Security

Webmail Using the Hush Encryption Engine

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

FRCC Secure Data Transfer. Users Guide V1.0

Sterling Integrator. PGP Server Manager 5.1

How to Setup Privacy Guard Encryption.

4. Click Next and then fill in your Name and address. Click Next again.

PDG Software. PDG Key Manager User Guide

WS_FTP Professional 12. Security Guide

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your communication. Topic

Digital Signatures on iqmis User Access Request Form

Yale Software Library. PGP 9.6 for Windows

Receiving Secure from Citi For External Customers and Business Partners

PDG Software. Keyman Encryption Guide

gpg4o Manual Version 3.0

How to Create and Maintain an Anonymous Identity Online

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

ASA 8.x: Renew and Install the SSL Certificate with ASDM

WS_FTP Professional 12. Security Guide

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Why Johnny Can't Encrypt: A Usability Study of PGP

BatzenCA Documentation

Adding Digital Signature and Encryption in Outlook

WS_FTP Professional 12

Pretty Good Privacy PGP for Personal Privacy, Version 5.0. User s Guide. PGP, Inc. For the Mac OS

Sharing Secrets Using Encryption Facility

AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version January 2008

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

THUNDERBIRD WORKBOOK

Secure Part II Due Date: Sept 27 Points: 25 Points

Using Entrust certificates with Microsoft Office and Windows

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

IBM Client Security Solutions. Client Security User's Guide

X.509 Certificate Generator User Manual

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

AxCrypt File Encryption Software for Windows. Quick Installation and Users Guide. Version 1.7 or later. July 2012

Adobe Digital Signatures in Adobe Acrobat X Pro

Cryptography and Network Security Chapter 15

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Introduction to Cryptography

BitLocker To Go User Guide

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide

Exam Papers Encryption Project PGP Universal Server Trial Progress Report

End-User Reference Guide

End-User Reference Guide

Network Security Essentials Chapter 7

Published : License : None

PGP Desktop Quick Start Guide version 9.6

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

SECURE USER GUIDE OUTLOOK 2000

End-User Reference Guide

Using your Encrypted BlackBerry

HMRC Secure Electronic Transfer (SET)

SNMP Manager User s Manual

1 of 10 1/31/2014 4:08 PM

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

DA BIOMETRIC FINGERPRINT READER 2,5" HDD ENCLOSURE User Manual

TABLE OF CONTENTS. Legend:

Zmanda Cloud Backup Frequently Asked Questions

Implementing Secure Sockets Layer on iseries

Attix5 Pro Server Edition

Building a Web of Trust. NANOG 29, Chicago, October 2003 Joe Abley <jabley@isc.org>

Principle, utilization and limitations for secure electronic mail systems. Lindomar Bandeira Rocha

Installation Guide For Choic Enterprise Edition

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

dobe Acrobat XI Pro Digital Signatures

Transcription:

Ubuntu Open PGP IMPLEMENTATION Dr. ENİS KARAARSLAN 2014

Enter your personal information, select your key encryption type, key strength, and when you want your key to expire. Your name and email address can be anything you want, not necessarily your real name or email address. If you want to use your OpenPGP key for encrypting email, put the email address you want to use with encryption in the Email Addresss box. Either RSA or DSA Elgamal will be fine for the encryption type RSA is newer, though it may take longer to generate keys initially. For key strength, use the strongest available 4096 bits, at the time of writing.

Enter a strong password that you can remember. If you forget this password, it cannot be recovered and any encrypted data you have using it, including emails, will be permanently inaccessible.

The computer will now generate the key, which may take a long time. After this, you will have a OpenPGP key pair that is ready to be used. You can manage the key options, export the public key, change the password, delete and/or revoke the key, and perform other key adjustments through the interface

Some other plugins are needed to be installed Import Key Decrypt file

You can import mine or your other friends key by using the menu: Remote Find remote keys

Type some key words (a name or alias) to search the key servers. The best way to find someone is to search for their email address, as it s uniquely tied to them. Select and review the keys that are returned to determine whether the key(s) returned belong to the person you re looking for. You can review additional information about the key by pressing the Properties button.

Once you ve determined and selected the key(s) you want to import into your local keyring, press Import.

Encryption Gnu privacy assistant gpa Kleopatra

GPA Run from command line ( disable unsupported x509 certificates.): gpa disable-x509 (You can also find the shortcut (Applications -> Accessories -> gpa), click Properties, and add your argument to the command.)

List your public keys: gpg list-keys enisk@atilgan:~/documents$ gpg --fingerprint /home/enisk/.gnupg/pubring.gpg ------------------------------ pub 4096R/6D122D94 2014-05-21 Key fingerprint = 233E A1F2 6F67 346B 4042 823D 12C5 051F 6D12 2D94 uid Enis Karaarslan <enis.karaarslan@gmail.com> sub 4096R/6675C055 2014-05-21

Set your key as the default key by entering this line in your ~/.bashrc. export GPGKEY=6D122D94 Please note that will be sourced only during your next session, unless you source it manually. Now restart the gpg-agent and source your.bashrc again: killall -q gpg-agent eval $(gpg-agent --daemon) source ~/.bashrc

If you created an "RSA (sign only)" earlier, you will probably want to add encryption capabilities. Assuming you edited ~/.bashrc as above, open a terminal again and enter: gpg --cert-digest-algo=sha256 --edit-key $GPGKEY

enisk@atilgan:~$ gpg --cert-digest-algo=sha256 --edit-key $GPGKEY gpg (GnuPG) 1.4.14; Copyright (C) 2013 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Secret key is available. pub 4096R/6D122D94 created: 2014-05-21 expires: never usage: SC trust: ultimate validity: ultimate sub 4096R/6675C055 created: 2014-05-21 expires: never usage: E [ultimate] (1). Enis Karaarslan <enis.karaarslan@gmail.com>

Encrypt gpg --output cevap.gpg --encrypt --recipient enis.karaarslan@gmail.com Documents/sinavsoru

Decrypt enisk@atilgan:~$ gpg --output cevapdesifre.txt --decrypt cevap.gpg You need a passphrase to unlock the secret key for user: "Enis Karaarslan <enis.karaarslan@gmail.com>" 4096-bit RSA key, ID 6675C055, created 2014-05-21 (main key ID 6D122D94) gpg: problem with the agent - disabling agent use gpg: encrypted with 4096-bit RSA key, ID 6675C055, created 2014-05-21 "Enis Karaarslan <enis.karaarslan@gmail.com>"

Test Test with your public and private keys to see if it is working...

gpg --cert-digest-algo=sha256 --edit-key $GPGKEY

Create a signature file This is done for AUTHENTICATION A signed document has limited usefulness. Other users must recover the original document from the signed version, and even with clearsigned documents, the signed document must be edited to recover the original. Therefore, there is a third method for signing a document that creates a detached signature, which is a separate file. A detached signature is created using the --detach-sig option. enisk@atilgan:~$ gpg --output cevap.sig --detach-sig cevap.gpg You need a passphrase to unlock the secret key for user: "Enis Karaarslan <enis.karaarslan@gmail.com>" 4096-bit RSA key, ID 6D122D94, created 2014-05-21 gpg: problem with the agent - disabling agent use

Verify Signature Both the document and detached signature are needed to verify the signature. The --verify option can be to check the signature. enisk@atilgan:~/deneme$ gpg --verify cevap.sig cevap.gpg gpg: Signature made Fri 23 May 2014 03:26:26 PM EEST using RSA key ID 96EB149C gpg: Good signature from "Deneme Ogrenci <denemeogrenci@mu.edu.tr>"

Sign with other's pub key enisk@atilgan:~$ gpg --output cevap.gpg --encrypt --recipient murat.soysal@tubitak.gov.tr Documents/sinavsoru gpg: AFB0F3FC: There is no assurance this key belongs to the named user pub 2048R/AFB0F3FC 2012-07-02 Murat Soysal (e-mail address changed) <murat.soysal@tubitak.gov.tr> Primary key fingerprint: CE23 B155 6560 707E F01A F7D1 D2E9 EBF2 283D 85CE Subkey fingerprint: B9C9 F77C 9417 9285 9289 7109 188F CB89 AFB0 F3FC It is NOT certain that the key belongs to the person named in the user ID. If you *really* know what you are doing, you may answer the next question with yes. Use this key anyway? (y/n) y

Test A key with denemeogrenci@mu.edu.tr is generated on another machine All these are tested on 2 different machines, one simulation student and other simulating the teacher. System works as expected.

EXPECTED Inform me of your public key so that I can import it To encrypt with the teachers public key ( enis.karaarslan@gmail.com - KEYID=6D122D94) cevap.gpg To create a signaturefile with your private key cevap.sig Tar these documents in the format yoursurname_name_answer.tar Send it to enis.karaarslan@gmail.com

References [1] https://www.riseup.net/en/howto-gpg-keys [2] https://www.gnupg.org/gph/en/manual.html#a EN111