wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to Encrypt and Decrypt Using GNU PGP

profile
Kiddoneeta
Oct 08, 2017
0 Likes
0 Discussions
629 Reads

Steps for Installing GPG4WiN:

Open gpg4win setup file and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select destination for where it is going to save

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Install button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Click on Yes button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select option "I want to manually reboot later". And click on Finish button

How to Encrypt and Decrypt Using GNU PGP

Now open the software GPA

How to Encrypt and Decrypt Using GNU PGP

Generating private keys:

Click on Generate key now button

How to Encrypt and Decrypt Using GNU PGP

How to Encrypt and Decrypt Using GNU PGP

Enter the name

How to Encrypt and Decrypt Using GNU PGP

Enter Email Address

How to Encrypt and Decrypt Using GNU PGP

Select option "Do it later" and then click on Forward button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Enter password and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Re-Enter the same password and click OK button

How to Encrypt and Decrypt Using GNU PGP

This will generate the key.

Exporting keys:

How to Encrypt and Decrypt Using GNU PGP

Click on Detailed button

How to Encrypt and Decrypt Using GNU PGP

Click on Export tab

How to Encrypt and Decrypt Using GNU PGP

Give name to the file

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

For Encrypt,

Create new text file . Write few text on it like "This is hidden text" and Save it.

How to Encrypt and Decrypt Using GNU PGP

Right Click on that text file. Select "Sign and Encrypt".

How to Encrypt and Decrypt Using GNU PGP

Select the option "Sign and Encrypt (OpenPGP only)" and click Next button

How to Encrypt and Decrypt Using GNU PGP

Select the file and click on ADD button

How to Encrypt and Decrypt Using GNU PGP

Then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on "Sign & Encrypt" button

How to Encrypt and Decrypt Using GNU PGP

Type password as you had given pervious and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP

For Decrypt,

Right Click on extension of file which is gpg . Select "Decrypt and Verify".

How to Encrypt and Decrypt Using GNU PGP

Click on "Decrypt/Verify" button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP          

Comments ()


Sign in

Read Next

Man VS Nature

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Why we fail after giving 100% ?

Blog banner

Smartsheet

Blog banner

Scala - a programming tool

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Education?

Blog banner

Business Engineering

Blog banner

Khau Galli – Vile Parle

Blog banner

How To Secure Operating Systems ?

Blog banner

Characteristics of Etherum

Blog banner

Modern operating system

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Message Passing in OS

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Data Warehouse Bus Matrix

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Security requirements for Safe E-Payments

Blog banner

Types Of scheduling

Blog banner

Texting is actually better than talking in person

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Impact of social media on the human life

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

My First Dream Bike

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

c

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Data Visualization

Blog banner

FASHION

Blog banner

Sagar Parikrama

Blog banner

GUIDE TO GIS

Blog banner

Benefits and drawback of web security.

Blog banner

Street foods

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

RAID

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Open relationships

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner