<p>GnuPG, commonly known as GPG, is an open source implementation of the <a href=”https://www.techtarget.com/searchsecurity/definition/Pretty-Good-Privacy”>Pretty Good Privacy</a> cryptography standard. It offers symmetric and asymmetric encryption for data at rest and in transit.</p>
<p>This article introduces how to use GPG, demonstrates its installation on common OSes and provides instructions for its use.</p>
<section class=”section main-article-chapter” data-menu-title=”How does GPG protect data?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>How does GPG protect data?</h2>
<p>Encryption seeks to satisfy the following three goals:</p>
<ul class=”default-list”>
<li><b>Authenticity</b>. Guaranteeing the source of a message.</li>
<li><b>Integrity.</b> Guaranteeing a message did not change unexpectedly.</li>
<li><b>Nonrepudiation</b>. Guaranteeing the source of the message.</li>
</ul>
<p>GPG satisfies all three goals by combining symmetric and asymmetric cryptography to protect stored files and digital communications.</p>
<p>Symmetric and asymmetric cryptography are critical components of today’s security and privacy strategies. Symmetric cryptography uses a single <a href=”https://www.techtarget.com/searchsecurity/definition/private-key”>private key</a> (shared secret) to both encrypt and decrypt data, while asymmetric cryptography uses a mathematically related public and private key pair. Data encrypted with one key can only be decrypted by the other — for example, data encrypted using the public key can only be decrypted using the related private key.</p>
<p>GPG combines these two approaches and enables users to ensure data privacy, source and integrity. As a result, GPG is widely used and supported.</p>
<h3>Common GPG use cases</h3>
<p>Consider the following ways to use GPG to secure data storage and transmission:</p>
<ul class=”default-list”>
<li>Encrypted email for confidentiality.</li>
<li>Digitally signed email for authenticity.</li>
<li>Encrypted files for data confidentiality.</li>
<li>Digitally signed software packages, scripts and other applications.</li>
<li>Digitally signed <a href=”https://www.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: