documentation:gpg-keys
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| documentation:gpg-keys [2019/10/02 22:36] – derek | documentation:gpg-keys [2019/10/03 11:49] (current) – [Quick overview] derek | ||
|---|---|---|---|
| Line 24: | Line 24: | ||
| This system is implemented to make conversion from public key to private impossible. Well, in this scheme the sender is encrypting a data with a receiver public key, and encrypted data might be ridden only with receiver private key. | This system is implemented to make conversion from public key to private impossible. Well, in this scheme the sender is encrypting a data with a receiver public key, and encrypted data might be ridden only with receiver private key. | ||
| - | **NOTE:** __NEVER SEND YOUR PRIVATE KEY(S) OVER ETHERNET | + | **NOTE:** __NEVER SEND YOUR PRIVATE KEY(S) OVER INTERNET |
| === Signing === | === Signing === | ||
| + | Another problem is a way to check a data authenticity e.g. ability to check if a message was really sent by alleged sender. To mitigate this problem a concept of digital signature was proposed. If you have a senders public key and signature for a received data you are able to check this data authenticity. | ||
| === Key servers === | === Key servers === | ||
| + | Everything has a weak point, the weak point of this cryptography scheme is the spreading of public keys. Some user could bring a false public key with someone' | ||
| + | |||
| + | **NOTE:** always check a new public keys, if you're able to check the identity of the public key owner this is a best way to do so. | ||
| ==== Used terms ==== | ==== Used terms ==== | ||
| + | |||
| + | ^ Term ^ Description ^ | ||
| + | | Public key | A part of your key is freely accessible used for/to: check your signature, encrypt data for you | | ||
| + | | Private key | A secret part of the key, used to: decrypt data, sign the data | | ||
| + | | Digital signature/ | ||
| + | | MUA | MUA is a Mail User Agent e.g. mail client used to have a deal with emails | | ||
| ==== Why to use gpg? ==== | ==== Why to use gpg? ==== | ||
| + | It might be feel weird to use gpg for mail as example, since connections between MUA and server is secure and encrypted. Well, with the MUA your email is going with the following steps: | ||
| + | * Transfers to the destination mail server (encrypted) | ||
| + | * Stored on the destination mail server (not encrypted) | ||
| + | * Fetched via receiver' | ||
| + | * Stored on the receiver' | ||
| + | Using the same server for secure messaging is a good idea (you may trust for the server), but it's not enough. Firstly it's limiting you to have a conversations with other part of the world, secondly it doesn' | ||
| + | |||
| + | Also, you should notice some mail servers (google mail is a good example) actually is reading mail messages for some purposes (any free (I meant free as a beer here) email service will do mail reading). | ||
| + | |||
| + | In order to get a truly secure conversations you must use gpg for this. GPG encrypted messages are stored on the server, but without private key nobody is able to read this message. Also, you kept a sent message encrypted and impossible to read either by you. Finally, it's better to avoid free email services such as google mail (if it's possible). | ||
| + | |||
| + | Askele mail service is going deeper with privacy and security and provide [[: | ||
| ===== First steps ===== | ===== First steps ===== | ||
| + | First steps means the first operations required to start using gpg encryption scheme. Specific software information is provided later on this page. This is a " | ||
| ==== Create your own key ==== | ==== Create your own key ==== | ||
| + | The very first step is to create a key pair for your own. Usually you need to provide the following information: | ||
| + | * Your real name | ||
| + | * Your email | ||
| + | * Passphrase | ||
| + | |||
| + | If you're planning to use gpg with email, provide email of the purpose. Passphrase is used to crypt your private key (passphrase will be required on each operation with cryptography), | ||
| + | |||
| + | Please note, you will be asked (via software) to provide expiration date for the new key-pair, we don't recommend to use pairs without expiration date, the optimal lifespan for the pair is 2 years. | ||
| + | |||
| + | Spread your public key to your recipients in order to make public-private scheme works with desired contacts. | ||
| ==== Import other keys ==== | ==== Import other keys ==== | ||
| + | The next step is to get your contacts public keys and import it. | ||
| ==== Key servers ==== | ==== Key servers ==== | ||
| + | We'd recommend to publish your public key on public key servers. | ||
| Line 47: | Line 82: | ||
| ==== Signing ==== | ==== Signing ==== | ||
| + | MUA can sign your emails automatically, | ||
| ==== Encryption ==== | ==== Encryption ==== | ||
| + | For secure communications it's better to encrypt a message, MUA is doing this job for your emails (and attachments as well). But you're able to encrypt a data on your local storage to make it safe. | ||
| ===== Software to use ===== | ===== Software to use ===== | ||
| - | + | There are a plenty of software, however there are most popular described: | |
| + | * [[: | ||
| + | * [[: | ||
documentation/gpg-keys.1570055805.txt.gz · Last modified: by derek
