| 1 comments ]

Kgpg "GPG encrypts and decrypts" your mail and selected files.

About GnuPG

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kind of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of front-end applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.

Basic Usage

Basic Usage

There are many command-line options to achieve gpg encryption. With KGpg the anxiety is removed - you don't have to remember any commands. KGpg can help you set up and manage your keys, import and export keys, view key signatures, trust status and expiry dates. In fact just about everything you need to do is covered by KGpg. A wizard is provided to help you set up your keys.

(For a larger image, click on the following (click here)

You can access this application in the following ways:

  • Computer ▸ More Applications ▸ Accessories section ▸ KGpg.
  • From the command line, type: 'kgpg &'

KGpg Setup Wizard

KGpg Setup Wizard

  • If you don't have a key, KGpg will automatically pop up the key generation dialog at the first startup. You can also access it in the Key Manager from Keys ▸ Generate Key Pair.
  1. Click Next
  2. Click Next to accept the default configuration file location. Or alter the location if desired.
  3. Select to install 'shredder' by clicking on the check box. Shredder securely deletes files.
  4. For KDE users, they can have kgpg start automatically by selecting this option.
  5. KGpg will automatically pop up the key generation dialog. Simply enter your name, Email address and click Ok. This will generate a standard gpg key. If you want more options, you can click on the Expert mode button, which will bring up a Konsole window with all of gpg's options.

    Many people play around with their first key, generate bad user ids, add comments they later regret or simply forget their passphrase. To avoid such keys to stay valid forever it's usually a good idea to limit the lifetime to some 12 month. You can modify the lifetime of your secret keys later using the key properties window.
  6. Input a private key password and confirm correct by typing it again in the verify text box.
  7. Key generation process will begin, this could take several minutes.
  8. A final dialog box will appear giving a summary. It is recommended that you create a revocation certificate in case your certificate becomes "compromised".


Encrypting Your Data

Encrypting Your Data

Encrypting a file from Konqueror or Dolphin

Click on the file you want to encrypt with the right mouse button. Choose Actions->Encrypt File in the pop up menu. You will then be prompted with the Public key selection dialog. Choose the key of the recipient and click Encrypt. The encrypted file will be saved with a .asc or .gpg extension depending on whether you chose ASCII encryption or not. ASCII encrypted files only use readable characters to represent the data resulting in files that are more robust when copied around or sent by mail but are one third larger.

Encrypting a text with KGpg's applet

You can encrypt the contents of the clipboard by selecting the Encrypt clipboard item in applet menu. When you choose Sign clipboard then the text will be signed instead. Both actions will import the current clipboard contents into an editor window, perform the requested action and paste the contents back into the editor.
Encrypting text from KGpg's editor

This is as simple as clicking on the Encrypt button. You will then be prompted with the Public key selection dialog. Choose your key and click Ok. The encrypted message will appear in the editor window.

Usually you can only encrypt files with keys that are trusted by you. Since you sometimes want to just send a confident note to some random people you are aware of having a GPG key you can set the option Allow encryption with untrusted keys.

To make sure that you can decrypt every file you have encrypted even if they are encrypted with someone else's key you can use the options Always encrypt with and Encrypt files with which are available in the KGpg configuration.

For more information on the encryption options ASCII armor, Allow encryption with untrusted keys and Symmetrical encryption, please refer to gpg's documentation or man pages.


Decrypting Your Data

Decrypting Your Data

Decrypting a file from Konqueror or Dolphin

Left click on the file you want to decrypt. Enter your passphrase and it will be decrypted. You can also drag an encrypted text file and drop it into KGpg's editor window. It will then ask the passphrase and open the decrypted text in KGpg's editor. You can even drop remote files ! You can also use the File->Decrypt File and choose a file to decrypt.

Decrypting text with KGpg's applet

You can also decrypt the contents of the clipboard with the decrypt clipboard menu entry of the KGpg applet. An editor window will show up with the decrypted text.
Decrypting a text from the editor

Copy or Drag and Drop the text you want to decrypt, and click on the Decrypt button. You will be prompted for the passphrase.


Encrypting Your Data

Key Management

All basic key management options can be performed through KGpg. To open the key management window click the left mouse button on KGpg's applet. Most options are available with a right click on a key. To import/export public keys, you can use drag and drop or the Copy/Paste keyboard shortcuts.
Key Manager

In this example you see a key group containing two keys, two key pairs and three public keys. The third column shows the trust you have in the keys. The first key pair is ultimately trusted and is also set as the default key (bold font) while the second one has expired. Two of the public keys are fully trusted while the trust of the last key is marginal. The last key is expanded, showing it's ElGamal subkey, an additional user id, both also with marginal trust, and some of it's signatures.

Signatures allow navigating through your keyring. Double clicking on a signature or a key shown as member of a group will jump directly to the corresponding primary key.

Key properties

While the key manager allows you to do general actions with one or multiple keys, key groups or signatures, the key properties window gives you access to a single key. You can reach it by pressing enter in the key manager or double clicking the key.

In this window you can change the key passphrase and expiration of your secret keys. For all keys you can also set the owner trust value.

This value indicates how much you trust the owner of this key to correctly verify the identity of the keys he signs. Taking the owner trust into account gpg creates your own web of trust. You trust the keys you signed. If you assign owner trust to these persons you will also trust the keys they have signed without the need that you first have to sign their keys too.


Further Information

Further Reading and Information

For more information regarding KDE Gpg Tool , please refer to the following external website:

1 comments

deepak singh said... @ November 27, 2016 at 10:57 PM

Thanks for providing this informative information you may also refer.
http://www.s4techno.com/blog/2016/07/12/quick-guide-to-iscsi-on-linux-and-solaris/

Post a Comment