They are often really, really big numbers, but simple integers nonetheless. One important aspect of cryptographic keys is that they are simply numbers. PGP is the protocol, and the command line tool we use to perform tasks using this protocol is called gpg. You can think of OpenPGP as email and GPG as one implementation of the email protocol (like Hotmail or Gmail). In practice, the terms GPG, OpenPGP, and PGP are often used interchangably even though they probably shouldn't be. GPG implements the OpenPGP standard maintained by the Internet Engineering Task Force. GPG stands for GNU Privacy Guard and is a small open source piece of software that allows you to manage keys for cryptographic purposes. Check out Part 2 for the lowdown on how to encrypt and decrypt messages. Note: this post is the first of a 2-part series aimed at developing a functional use of GPG for the day-to-day tasks of anyone who cares about software. The goal of this article is to get you up to speed on two of the main uses of the GPG cli software: cryptographically signing and verifying signatures on data. It turns out it's rather easy, and all you need is a terminal and maybe half an hour of time! You can browse more details and other various blog posts and articles he has written onĪnyone who cares about software should learn how to produce cryptographic signatures on data (documents, messages, binaries, git commits) and how to verify other people's signatures on those types of data. Regular contributor to forum discussions. He has written around 3 posts here and has been a Thunderbiscuit is a tech enthusiast and creative writer and has been writing It covers aĭetails targetting bash, linux, commandline, pgp and various other things. This article was written by thunderbiscuit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |