How to use GPG to encrypt and decrypt files

<p>GnuPG, commonly known as GPG, is an open source implementation of the <a href=”https://www.techtarget.com/searchsecurity/definition/Pretty-Good-Privacy”>Pretty Good Privacy</a> cryptography standard. It offers symmetric and asymmetric encryption for data at rest and in transit.</p>
<p>This article introduces how to use GPG, demonstrates its installation on common OSes and provides instructions for its use.</p>
<section class=”section main-article-chapter” data-menu-title=”How does GPG protect data?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>How does GPG protect data?</h2>
<p>Encryption seeks to satisfy the following three goals:</p>
<ul class=”default-list”>
<li><b>Authenticity</b>. Guaranteeing the source of a message.</li>
<li><b>Integrity.</b> Guaranteeing a message did not change unexpectedly.</li>
<li><b>Nonrepudiation</b>. Guaranteeing the source of the message.</li>
</ul>
<p>GPG satisfies all three goals by combining symmetric and asymmetric cryptography to protect stored files and digital communications.</p>
<p>Symmetric and asymmetric cryptography are critical components of today’s security and privacy strategies. Symmetric cryptography uses a single <a href=”https://www.techtarget.com/searchsecurity/definition/private-key”>private key</a> (shared secret) to both encrypt and decrypt data, while asymmetric cryptography uses a mathematically related public and private key pair. Data encrypted with one key can only be decrypted by the other — for example, data encrypted using the public key can only be decrypted using the related private key.</p>
<p>GPG combines these two approaches and enables users to ensure data privacy, source and integrity. As a result, GPG is widely used and supported.</p>
<h3>Common GPG use cases</h3>
<p>Consider the following ways to use GPG to secure data storage and transmission:</p>
<ul class=”default-list”>
<li>Encrypted email for confidentiality.</li>
<li>Digitally signed email for authenticity.</li>
<li>Encrypted files for data confidentiality.</li>
<li>Digitally signed software packages, scripts and other applications.</li>
<li>Digitally signed <a href=”https://www.

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: