Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (2024)

Transmitting encrypted data with GPG (GNU Privacy Guard) on the Mac platform requires four basic steps. First you install GPG; GPG Tools is an easy to use frontend application for GPG on Mac. It provides a simple interface for managing keys and shell integration for quickly encrypting and decrypting files. GPG relies on public key cryptography, so the next step is to generate your public and private key pair used for the actual encryption and decryption process. Third you must exchange and sign public keys with the people that you wish to exchange secure data with. After that initial setup, encrypting files for secure transmission is very easy.

Install GPG Tools

  1. Download GPG Tools and install. The install procedure is a standard Mac pkg install.

Key Generation

The encryption process requires a pair of keys, one public and one private. Data that is encrypted using the public key can only be decrypted using the private key. Your public key can be made public so that others can use it to encrypt data to send to you. Your private key should never be shared and should always be kept secure. When others send data to you that is encrypted with your public key, only you, the owner of the matching private key can decrypt that data.

  1. After starting the GPG Keychain Access app for the first time you need to create a public and private key pair for encrypting and decrypting data. Select “New” to begin the key generation process.
  2. Enter your name and email address in the pop up window that appears. You will also create a passphrase here to protect your private/secret key. You will need this passphrase any time you need access to your keys for encrypting and decrypting. Click “Generate key” after entering your information and your key pair will be created after a short time. Your keys will then be listed in the GPG Keychain Access main window.Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (1)Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (2)

Key Exchange

In order to share encrypted data with another person you need to exchange public keys. You need their public key in order to encrypt data that only they can decrypt. Likewise, they need your public key to send encrypted data to you.

  1. To export your public key, select your key in GPG Keychain Access and then click Export in the menu. Do not select “Allow secret key export”; your secret key should never be given to anybody. Click save to export your public key as an asc file.Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (3)
  2. You can now send that public key to anybody that you will be sending you encrypted data. The other party will encrypt the data with your public key and your private key will be the only way to decrypt it.
  3. The other party should send you their public key, so that you can encrypt data to send to them. After you receive a public key from somebody, you can import into your keychain. Select Import from the menu in GPG Keychain Access and select the public key that was sent to you.
  4. After importing a public key, you should verify that the key actually belongs to the person that you believe it belongs to. If you are certain that the key is valid, you should sign the key to signify that it should be trusted. To sign a key, right-click it and select “Sign…”. You will need to enter your passphrase to unlock your secret key in order to sign a key.Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (4)

Encrypt & Decrypt

  1. To encrypt a file, right-click it, navigate to the “Services” sub-menu and click “OpenPGP: Encrypt File”.Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (5)
  2. You will now see a dialog for selecting encryption options. Check the recipient that you wish to send the file to. The file will be encrypted with their public key, and therefore can only be decrypted with their private key. Check the “Sign” checkbox to sign the encrypted file with your private key to allow the recipient to verify that this file was definitely encrypted by you. Click “OK” to encrypt the file; you will need to enter your passphrase to unlock your secret key. A file with the gpg file extension will be created in the same directory as your original file.Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (6)
  3. To decrypt a file that has been sent to you, right-click the file and select “OpenPGP: Decrypt File” from the “Services” menu.Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (7)
Adopting Safer Habits: Using GPG Tools to Encrypt Files | Information Technology Services | Allegheny College (2024)
Top Articles
OI Analytics, Separate ETFs Pages and More: Now Available on Angel One!
Can Foreigners Place Fixed Deposits in Singapore? A Comprehensive Guide
Friskies Tender And Crunchy Recall
Bild Poster Ikea
Best Pizza Novato
Brady Hughes Justified
Beacon Schnider
Ds Cuts Saugus
What Auto Parts Stores Are Open
O'reilly's In Monroe Georgia
Think Of As Similar Crossword
Declan Mining Co Coupon
Best Pawn Shops Near Me
Classic Lotto Payout Calculator
Arboristsite Forum Chainsaw
Louisiana Sportsman Classifieds Guns
Talbots.dayforce.com
Libinick
Persona 4 Golden Taotie Fusion Calculator
Exterior insulation details for a laminated timber gothic arch cabin - GreenBuildingAdvisor
Panic! At The Disco - Spotify Top Songs
Shopmonsterus Reviews
Menus - Sea Level Oyster Bar - NBPT
Talkstreamlive
Boston Dynamics’ new humanoid moves like no robot you’ve ever seen
Regal Amc Near Me
TeamNet | Agilio Software
The Banshees Of Inisherin Showtimes Near Broadway Metro
Creed 3 Showtimes Near Island 16 Cinema De Lux
Ocala Craigslist Com
Ff14 Sage Stat Priority
Dubois County Barter Page
One Credit Songs On Touchtunes 2022
Great Clips On Alameda
Trebuchet Gizmo Answer Key
Appraisalport Com Dashboard /# Orders
Tamilyogi Ponniyin Selvan
The Land Book 9 Release Date 2023
American Bully Xxl Black Panther
Chatropolis Call Me
Spectrum Outage in Genoa City, Wisconsin
Craigslist En Brownsville Texas
How to Quickly Detect GI Stasis in Rabbits (and what to do about it) | The Bunny Lady
Sun Tracker Pontoon Wiring Diagram
Directions To Cvs Pharmacy
Gas Buddy Il
UNC Charlotte Admission Requirements
Page 5747 – Christianity Today
10 Best Tips To Implement Successful App Store Optimization in 2024
Noelleleyva Leaks
Inloggen bij AH Sam - E-Overheid
Qvc Com Blogs
Latest Posts
Article information

Author: Aron Pacocha

Last Updated:

Views: 6164

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Aron Pacocha

Birthday: 1999-08-12

Address: 3808 Moen Corner, Gorczanyport, FL 67364-2074

Phone: +393457723392

Job: Retail Consultant

Hobby: Jewelry making, Cooking, Gaming, Reading, Juggling, Cabaret, Origami

Introduction: My name is Aron Pacocha, I am a happy, tasty, innocent, proud, talented, courageous, magnificent person who loves writing and wants to share my knowledge and understanding with you.