Changes between Version 22 and Version 23 of gpg


Ignore:
Timestamp:
Jan 25, 2009, 2:07:52 PM (11 years ago)
Author:
Jamie McClelland
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • gpg

    v22 v23  
    11[[PageOutline]]
    22= How can I use gpg to both encrypt my email and prove my identity? =
     3
     4== In plain language, what does it mean to encrypt my email? ==
     5
     6For most of us, when we first decide we want to encrypt our email, we only think about one half of the equation: scrambling our message in a way that only the intended recipient can read it.
     7
     8A second, and equally important component that is often over looked is authenticity. If someone sends you a secret message, how do you know it was sent by the person who is claiming to have sent it?
     9
     10Encryption (scrambling your message) and authenticity (knowing who really sent the message) are the two pillars of secure communication. You must have both to securely send private messages between two parties.
     11
     12Therefore, when sending mail that you want to keep private, you will typically want to both encrypt the message ''and'' digitally sign the message. When receiving email using GnuPG you will typically want to de-crypt the message ''and'' verify the signature.
     13
     14Alternatively, if you want to send message and it's not important to keep it private, but you want the recipient to be sure it is you who is sending it, then you may simply want to digitally sign the message and not encrypt it.
    315
    416== GnuPG, gpg, OpenPGP, PGP, what does it all mean? ==
     
    1325
    1426GnuPG is one program (of many) that uses this open standard. GnuPG is free software and is one of the most popular implementations of OpenPGP.
    15 
    16 == In plain language, what does it mean to encrypt my email? ==
    17 
    18 For most of us, when we first decide we want to encrypt our email, we only think about one half of the equation: scrambling our message in a way that only the intended recipient can read it.
    19 
    20 A second, and equally important component that is often over looked is authenticity. If someone sends you a secret message, how do you know it was sent by the person who is claiming to have sent it?
    21 
    22 Encryption (scrambling your message) and authenticity (knowing who really sent the message) are the two pillars of secure communication. You must have both to securely send private messages between two parties.
    23 
    24 Therefore, when sending mail using GnuPG, you will typically want to both encrypt the message ''and'' digitally sign the message. When receiving email using GnuPG you will typically want to de-crypt the message ''and'' verify the signature.
    2527
    2628== Public and private keys ==