How to use PGP?


What even is PGP?

PGP stands for Pretty Good Privacy and it was invented by a man named Phil Zimmermann.
For many reasons the whole PGP's source code was published and many variants have because of it. You may read more in the links provided


Today GnuPG or the GNU Privacy Guard is being its most popular de facto implementations, basing its line on OpenPGP.

This is mostly used when encrypting private emails and can even be used for scrambling files to hide its true meaning, but it is also used to authenticate said emails and files with the help of digital signatures

Steps to use PGP

An example of generated keys

PGP Messages that you need to decrypt

More tutorials

Parts of a gpg generated key



C14E0E59767E57066A3967FAAA82ECD24B23FAB0 is the key ID
The rest is just history

The Key is actually from the first example above



This is the command for importing a key




This are the following commands for listing keys




More help on GnuPG




Digital Signatures


From this part we will use a detached signature



You may add -a before the following commands to make the signature a little better

This means the commands will look at this:

gpg -a --detach-sign -u [key name or key ID] [your_file]








More PGP Tutorials

For the meantime this tutorial only covers the Command Line Interface(CLI) side of PGP as of 2023, for more tutorials relating to the other PGP clients, please refer to the tutorial page

Known Neocities Sites for teaching the same thing

gameobservatory.neocities.org
thehackerwiki.neocities.org
Back to previous page
Back to index