ACC SHELL

Path : /usr/share/gnome/help/opensuse-manuals/C/
File Upload :
Current File : //usr/share/gnome/help/opensuse-manuals/C/cha.crypto.html

<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 7. Encryption with KGpg</title><link rel="stylesheet" href="susebooks.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="Documentation"><link rel="up" href="part.management.html" title="Part II. Information Management"><link rel="prev" href="cha.gnome.evolution.html" title="Chapter 6. Evolution: E-mailing and Calendaring"><link rel="next" href="cha.gnome.crypto.html" title="Chapter 8. Encryption with Passwords and Encryption Keys"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.apps.html">Application Guide</a><span class="breadcrumbs-sep"> &gt; </span><a href="part.management.html">Information Management</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 6. Evolution: E-mailing and Calendaring" href="cha.gnome.evolution.html"><span>&#9664;</span></a>  <a accesskey="n" title="Chapter 8. Encryption with Passwords and Encryption Keys" href="cha.gnome.crypto.html"><span>&#9654;</span></a></strong></p></div></td></tr></table></div><div class="chapter" title="Chapter 7. Encryption with KGpg"><div class="titlepage"><div><div><h2 class="title"><a name="cha.crypto"></a>Chapter 7. Encryption with KGpg<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#cha.crypto">¶</a></span></h2></div></div></div><div class="toc"><p><b>Contents</b></p><dl><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.why">7.1. Why Signing and Encrypting?</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.keygen">7.2. Generating a New Key Pair</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.mng.export">7.3. Exporting the Public Key</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.mng.import">7.4. Importing Public Keys from Others</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.serv">7.5. The Key Server Dialog</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.applet">7.6. Encrypting Your Data</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.basics">7.7. For More Information</a></span></dt></dl></div><a class="indexterm" name="idx.encryption"></a><a class="indexterm" name="idx.kgpg"></a><a class="indexterm" name="id527581"></a><p>
  You can sign or encrypt data with KGpg, a graphical user interface for
  GnuPG. This program helps you to generate and manage all needed keys. Use
  its editor function for the quick creation and encryption of files or use
  the applet in your panel to encrypt or decrypt by dragging and dropping.
  Other programs, such as your mail program (Kontact or Evolution), access
  the key data to process signed or encrypted contents. In the following
  sections, learn how to execute the following steps necessary for signing
  and encrypting data with KGpg:
 </p><div class="orderedlist"><ol class="orderedlist" type="1"><li><p>
    <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.keygen" title="7.2. Generating a New Key Pair">Generating a New Key Pair</a>
   </p></li><li><p>
    <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.mng.export" title="7.3. Exporting the Public Key">Exporting the Public Key</a>
   </p></li><li><p>
    <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.mng.import" title="7.4. Importing Public Keys from Others">Importing Public Keys from Others</a>
   </p></li><li><p>
    <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.applet" title="7.6. Encrypting Your Data">Encrypting Your Data</a>
   </p></li></ol></div><div class="sect1" title="7.1. Why Signing and Encrypting?"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.why"></a>7.1. Why Signing and Encrypting?<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.why">¶</a></span></h2></div></div></div><div class="variablelist"><dl><dt><span class="term">Signing</span></dt><dd><p>
      Signing means attaching electronic signatures to mails (or even
      software) to prove its origin. To avoid someone writing mails using
      your name and to protect both you and the recipients, you should sign
      your mails. Signatures help you to easily check the sender of the
      mails you receive and to distinguish authentic from malicious mails.
     </p><p>
      Software developers sign their software so you are able to check its
      integrity. Even if you have the software from an unofficial server,
      you can verify the package with the signature.
     </p></dd></dl></div><div class="variablelist"><dl><dt><span class="term">Encrypting</span></dt><dd><p>
      You might have sensitive information you want to protect from other
      parties. Encrypting helps you to transform data and make it unreadable
      for others. This is especially important for companies who must
      protect internal information as well as the employees' privacy.
     </p></dd></dl></div></div><div class="sect1" title="7.2. Generating a New Key Pair"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.keygen"></a>7.2. Generating a New Key Pair<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.keygen">¶</a></span></h2></div></div></div><a class="indexterm" name="id527713"></a><p>
   To be able to exchange encrypted messages with other users, first
   generate your own key pair. One part of it&#8212;the <span class="emphasis"><em>public
   key</em></span>&#8212;is distributed to your communication partners, who
   can use it to encrypt the files or e-mail messages they send. The other
   part of the key pair&#8212;the <span class="emphasis"><em>private key</em></span>&#8212;is
   used to decrypt the encrypted contents.
  </p><div class="important"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Important: Private Key versus Public Key"><tr class="head"><td width="32"><img alt="[Important]" src="admon/important.png"></td><th align="left">Private Key versus Public Key</th></tr><tr><td colspan="2" align="left" valign="top"><p>
    Only you should have access to the private key. Do not grant other users
    access to this data.
   </p><p>
    Your private key is protected with a passphrase. Choose the passphrase
    carefully: do not use words from a dictionary, and mix alphabetic with
    non-alphabetic characters.
   </p></td></tr></table></div><p>
   To create a new pair, proceed as follows:
  </p><div class="procedure"><ol class="procedure" type="1"><li><p>
     <a class="indexterm" name="id527762"></a>
     Start KGpg from the main menu or press <span class="keycap">Alt</span>+<span class="keycap">F2</span> and enter
     <span class="command"><strong>kgpg</strong></span>. When you start the program for the first time,
     a wizard appears, guiding you through the configuration. Follow the
     instructions up to the point where you are prompted to create a key.
    </p></li><li><p>
     Select <span class="guimenu">Keys</span>+<span class="guimenu">Generate Key
     Pair</span>, if you want to create a new key pair.
    </p><div class="figure"><a name="fig.kgpg_keygen"></a><p class="title"><b>Figure 7.1. KGpg: Creating a Key</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_keygen">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="35%"><tr><td><img src="images/kgpg_keygen.png" width="100%" alt="KGpg: Creating a Key"></td></tr></table></div></div></div><br class="figure-break"></li><li><p>
     Enter a name, an e-mail address, and optionally, a comment. If you do
     not like the default settings provided, also set the expiration time
     for the key, the key size, and the encryption algorithm used.
    </p></li><li><p>
     To generate a standard key, confirm your settings with
     <span class="guimenu">OK</span>. After clicking <span class="guimenu">OK</span>, a dialog
     prompts you to enter a passphrase twice. The passphrase protects your
     private key. The relative strength of your chosen password is measured
     and displayed by the <span class="guimenu">Password strength meter</span>. The
     key pair will be generated. This can take some time.
    </p><div class="note"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Note: Expert Mode"><tr class="head"><td width="32"><img alt="[Note]" src="admon/note.png"></td><th align="left">Expert Mode</th></tr><tr><td colspan="2" align="left" valign="top"><p>
      If you are an experienced user, use the <span class="guimenu">Expert Mode</span>
      to define additional options. This takes you to a terminal window
      where you can set the type of key to be generated, the key size (in
      bits) and the date of expiration. After entering your name and email
      address, you are prompted for a passphrase to protect your private
      key.
     </p></td></tr></table></div></li><li><p>
     After the key generation is finished, a summary will be displayed. Save
     and print the revocation certificate and keep it in a save place. You
     will need the certificate to revoke your passphrase if you forgot it.
     After you have confirmed with <span class="guimenu">OK</span>, KGpg displays its
     main window and you are finished.
    </p><div class="figure"><a name="fig.kgpg_manager"></a><p class="title"><b>Figure 7.2. KGpg Main Window: Key Management</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_manager">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="70%"><tr><td><img src="images/kgpg_manager.png" width="100%" alt="KGpg Main Window: Key Management"></td></tr></table></div></div></div><br class="figure-break"></li></ol></div><p>
   The main window shows the keys that belong to your key ring: your own key
   and the keys from other persons that you have already imported. As GnuPG
   uses a more sophisticated implementation of key pairs, for each user
   name, several sub keys are displayed but these can be neglected for the
   purpose of this chapter. Apart from some other details (like expiration
   date or creation date of the key and the ID), the main windows also shows
   the level of trust for each key, indicated by colors. White means that
   the trust level is unknown, blue indicates a high level of trust. For
   more information, see <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.mng.trust" title="7.4.2. Trusting Keys">Section 7.4.2, &#8220;Trusting Keys&#8221;</a>.
  </p><div class="note"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Note: KGpg Icon and Main Window"><tr class="head"><td width="32"><img alt="[Note]" src="admon/note.png"></td><th align="left">KGpg Icon and Main Window</th></tr><tr><td colspan="2" align="left" valign="top"><p>
    When you start KGpg in later sessions, only a small icon with a padlock
    appears in the system tray. Click that icon to display the main KGpg
    window on your desktop.
   </p></td></tr></table></div></div><div class="sect1" title="7.3. Exporting the Public Key"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.mng.export"></a>7.3. Exporting the Public Key<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.export">¶</a></span></h2></div></div></div><a class="indexterm" name="id527978"></a><p>
   After generating your key pair, make the public key available to other
   users. This enables them to use it to encrypt or sign the messages or
   files they send you. For example, if you want to encrypt a message for
   user tux, you encrypt it using tux' public key. To
   decrypt the message, tux uses his private key. If tux
   wants to send you a message, he encrypts it using your public key and you
   decrypt the message with your private key.
  </p><p>
   To make the public key available for others, select <span class="guimenu">Keys</span>+<span class="guimenu">Export Public Keys</span>. The dialog that opens offers four options:
  </p><div class="variablelist"><dl><dt><span class="term"><span class="guimenu">Email</span>
    </span></dt><dd><p>
      Your public key is sent to a recipient of your choice by email. If you
      activate this option and confirm with <span class="guimenu">OK</span>, the
      dialog for creating a new email message with your default mail program
      appears. Enter the recipient and click <span class="guimenu">Send</span>. The
      recipient receives your key and can then send you encrypted contents.
     </p></dd><dt><span class="term"><span class="guimenu">Clipboard</span>
    </span></dt><dd><p>
      You can place your public key here before continuing to process it.
     </p></dd><dt><span class="term"><span class="guimenu">Default Key Server</span>
    </span></dt><dd><p>
      To make your public key available to a wide audience, export it to one
      of the key servers on the Internet. For more information, refer to
      <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.serv" title="7.5. The Key Server Dialog">Section 7.5, &#8220;The Key Server Dialog&#8221;</a>.
     </p></dd><dt><span class="term"><span class="guimenu">File</span>
    </span></dt><dd><p>
      If you prefer to distribute your key as a file on a data medium
      instead of sending it by email, click this option, confirm or change
      the file path and name, and click <span class="guimenu">OK</span>.
     </p></dd></dl></div></div><div class="sect1" title="7.4. Importing Public Keys from Others"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.mng.import"></a>7.4. Importing Public Keys from Others<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.import">¶</a></span></h2></div></div></div><a class="indexterm" name="id528100"></a><p>
   If you receive a key in a file (for example, as an e-mail attachment),
   integrate it in your key ring with <span class="guimenu">Import Key</span> and use
   it for encrypted communication with the sender. You can also import keys
   from a public server if the person you want to communicate with has
   stored his public key there. For more information, see
   <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.serv" title="7.5. The Key Server Dialog">Section 7.5, &#8220;The Key Server Dialog&#8221;</a>. The procedure is similar to
   the procedure for exporting keys already described.
  </p><div class="sect2" title="7.4.1. Signing Keys"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.mng.sign"></a>7.4.1. Signing Keys<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.sign">¶</a></span></h3></div></div></div><a class="indexterm" name="id528131"></a><p>
    Keys can be signed like every other file to guarantee their authenticity
    and integrity. If you are absolutely sure an imported key belongs to the
    individual specified as the owner, express your trust in the
    authenticity of the key with your signature.
   </p><div class="important"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Important: Establishing a Web of Trust"><tr class="head"><td width="32"><img alt="[Important]" src="admon/important.png"></td><th align="left">Establishing a Web of Trust</th></tr><tr><td colspan="2" align="left" valign="top"><p>
     Encrypted communication is only secure to the extent that you can
     positively associate public keys in circulation with the specified
     user. By cross-checking and signing these keys, you contribute to the
     establishment of a Web of Trust. For these reasons, make really sure
     you only sign keys you have personally checked.
    </p></td></tr></table></div><p>
    Before you can use your key, you need to sign it yourself.
   </p><div class="procedure" title="Procedure 7.1. Signing A Key"><a name="id528162"></a><p class="title"><b>Procedure 7.1. Signing A Key</b></p><ol class="procedure" type="1"><li><p>
      Select the key to sign in the key list in the <span class="guimenu">Key Management
      </span> window.
     </p></li><li><p>
      Select <span class="guimenu">Keys</span>+<span class="guimenu">Sign
      Keys</span>.
     </p></li><li><p>
      Select the private key to use for the signature. An alert reminds you
      to check the authenticity of this key before signing it. In the drop
      down list, select how you carefully you have checked that the key
      belongs to the person with whom you want to communicate.
     </p></li><li><p>
      Click <span class="guimenu">Continue</span> and enter your passphrase in the
      next step. With entering the passphrase, you sign the key with your
      own private key. The signed key now appears green in the trust column.
     </p></li></ol></div><p>
    Other users can now check the signature by means of your public key.
   </p></div><div class="sect2" title="7.4.2. Trusting Keys"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.mng.trust"></a>7.4.2. Trusting Keys<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.trust">¶</a></span></h3></div></div></div><a class="indexterm" name="id528235"></a><p>
    Normally, you are asked by the corresponding program whether you trust
    the key, or rather, whether you assume it is really used by its
    authorized owner. This happens each time a message needs to be decrypted
    or a signature has to be checked. To avoid this, edit the trust level of
    the newly imported key. To trust a key and set a certain trust level, do
    the following:
   </p><div class="procedure"><ol class="procedure" type="1"><li><p>
      Right-click the key and select <span class="guimenu">Key Properties</span>.
     </p></li><li><p>
      Adjust the trust level in the <span class="guimenu">Owner Trust</span> drop-down
      list. This value indicates how much you trust the owner of this key to
      correctly verify the identity of the keys he signs.
     </p></li><li><p>
      Close the property dialog. If you have set the trust level to
      <span class="guimenu">Fully</span> or <span class="guimenu">Ultimately</span>, the key now
      appears blue in the trust column.
     </p></li></ol></div><p>
    The lower the trust level is, the less you trust the signer of the key
    to have checked the true identity of the keys signed. You may be
    entirely sure about the signer's identity, but this user may not check
    other people's identities properly before signing their keys. Notice
    that the trust level does not trigger any automatic actions by KGpg.
   </p></div></div><div class="sect1" title="7.5. The Key Server Dialog"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.serv"></a>7.5. The Key Server Dialog<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.serv">¶</a></span></h2></div></div></div><a class="indexterm" name="id528310"></a><p>
   Several Internet-based key servers offer the public keys of many users.
   To engage in encrypted communication with a large number of users, use
   these servers to distribute your public key. For this purpose, export
   your public key to one of these servers. Similarly, KGpg enables you to
   search one of these servers for the keys of certain people and import
   their public keys from the server. Open the key server dialog with
   <span class="guimenu">File</span>+<span class="guimenu">Key Server Dialog</span>.
  </p><div class="sect2" title="7.5.1. Importing a Key from a Key Server"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.serv.import"></a>7.5.1. Importing a Key from a Key Server<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.serv.import">¶</a></span></h3></div></div></div><a class="indexterm" name="id528346"></a><p>
    By means of the <span class="guimenu">Import</span> tab in the key server dialog,
    import public keys from one of the Internet-based key servers. Select
    one of the preconfigured key servers and enter a search string (e-mail
    address of the communication partner) or the ID of the key to find. When
    you click <span class="guimenu">Search</span>, your system connects to the
    Internet and searches the specified key server for a key that matches
    your specifications.
   </p><div class="figure"><a name="fig.kgpg_servimp"></a><p class="title"><b>Figure 7.3. Search Screen for Importing a Key</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_servimp">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="40%"><tr><td><img src="images/kgpg_servimp.png" width="100%" alt="Search Screen for Importing a Key"></td></tr></table></div></div></div><br class="figure-break"><p>
    If your search on the key server is successful, a list of all retrieved
    server entries is displayed in a new window. Select the key to include
    in your key ring and click <span class="guimenu">Import</span>. Confirm the
    following message with <span class="guimenu">OK</span>, then exit the key server
    dialog with <span class="guimenu">Close</span>. The imported key then appears in
    the main overview of the key manager and is ready for use.
   </p></div><div class="sect2" title="7.5.2. Exporting Your Keys to a Key Server"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.serv.export"></a>7.5.2. Exporting Your Keys to a Key Server<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.serv.export">¶</a></span></h3></div></div></div><a class="indexterm" name="id528434"></a><p>
    To export your key to one of the freely accessible key servers on the
    Internet, select the <span class="guimenu">Export</span> tab in the key server
    dialog. Designate the target server and the key to export by means of
    two drop-down menus. Then start the export with
    <span class="guimenu">Export</span>.
   </p><div class="figure"><a name="fig.kgpg_servexp"></a><p class="title"><b>Figure 7.4. Exporting a Key to a Key Server</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_servexp">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="40%"><tr><td><img src="images/kgpg_servexp.png" width="100%" alt="Exporting a Key to a Key Server"></td></tr></table></div></div></div><br class="figure-break"></div></div><div class="sect1" title="7.6. Encrypting Your Data"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.applet"></a>7.6. Encrypting Your Data<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.applet">¶</a></span></h2></div></div></div><a class="indexterm" name="id528506"></a><a class="indexterm" name="id528516"></a><a class="indexterm" name="id528526"></a><p>
   After you have generated your key pair, exported your public key and
   imported public keys from others, you can also send or receive encrypted
   mails. Refer to <a class="xref" href="cha.kontact.html#sec.kontact.mail.crypto" title="5.2.5. Signing and Encrypting emails">Section 5.2.5, &#8220;Signing and Encrypting emails&#8221;</a> to learn
   how to make use of those options in KMail.
  </p><p>
   KGpg also offers the possibility to encrypt text.

   To open the integrated editor choose <span class="guimenu">File</span>+<span class="guimenu">Open Editor</span>.
  </p><div class="sect2" title="7.6.1. Encrypting and Decrypting from a File Manager"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.dnd"></a>7.6.1. Encrypting and Decrypting from a File Manager<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.dnd">¶</a></span></h3></div></div></div><p>
    KGpg is also integrated into file managers like Dolphin or Konqueror.
    Generally, PGP-encrypted files are designated with the suffix
    <code class="filename">asc</code>. There are several options how to encrypt or
    decrypt files inside a File Manager:
   </p><div class="variablelist"><dl><dt><span class="term"><span class="guimenu">Encrypt a File</span>
     </span></dt><dd><p>
       To encrypt a file inside a File Manager, right-click the file and
       select <span class="guimenu">Actions</span>+<span class="guimenu">Encrypt
       File</span>. Choose one of the trusted keys in the
       dialog. After clicking <span class="guimenu">OK</span> in the dialog, a new
       file with the <code class="filename">asc</code> suffix will be created in the
       same directory.
      </p></dd><dt><span class="term"><span class="guimenu">Decrypt a File on the fly</span>
     </span></dt><dd><p>
       To decrypt an encrypted file instantly, right-click the file and
       select <span class="guimenu">Open with KGpg</span>. If
       the original filename already exists, a dialog opens that asks how to
       name the file or if it should be overwritten. KGpg prompts for the
       password of your private key and saves the decrypted file in the same
       directory.
      </p></dd><dt><span class="term"><span class="guimenu">Decrypt with the editor</span>
     </span></dt><dd><p>
       To decrypt an encrypted file with the editor, right-click the file in
       the File Manager and select <span class="guimenu">Actions</span>+<span class="guimenu">View file decrypted</span>.
      </p></dd></dl></div></div><div class="sect2" title="7.6.2. The KGpg Editor"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.edit"></a>7.6.2. The KGpg Editor<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.edit">¶</a></span></h3></div></div></div><a class="indexterm" name="id528658"></a><p>
    Instead of creating contents for encryption in an external editor then
    encrypting the file with one of the methods described above, you can use
    the integrated editor of KGpg. To open the editor, select <span class="guimenu">File</span>+<span class="guimenu">Open Editor</span>. In
    the editor, enter the desired text (or copy it into the editor from the
    clipboard or any file), and click <span class="guimenu">Encrypt</span>. Then
    select the key to use and complete the encryption procedure. To decrypt
    files, use <span class="guimenu">Decrypt</span> and enter the password associated
    with the key.
   </p><p>
    Generating and checking signatures is just as easy as encrypting
    directly from the editor. Go to <span class="guimenu">Signature</span>+<span class="guimenu">Generate Signature</span> and select the file to sign from the file dialog. Select
    the private key to use and enter the associated password. KGpg informs
    you of the successful generation of the signature. Files can also be
    signed from the editor by simply clicking
    <span class="guimenu">Sign/Verify</span>. To check a signed file, go to
    <span class="guimenu">Signature</span>+<span class="guimenu">Verify
    Signature</span> and select the file to check in the
    following dialog. After you confirm the selection, KGpg checks the
    signature and reports the result of the operation. Another possibility
    is to load the signed file into the editor and click
    <span class="guimenu">Sign/Verify</span>.
   </p></div></div><div class="sect1" title="7.7. For More Information"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.basics"></a>7.7. For More Information<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.basics">¶</a></span></h2></div></div></div><p>
   For comprehensive background information about the encryption method,
   refer to the GnuPG project pages at
   <a class="ulink" href="http://www.gnupg.org/documentation/index.en.html" target="_top">http://www.gnupg.org/documentation/index.en.html</a>.
   <a class="indexterm" name="id528740"></a>
   <a class="indexterm" name="id528747"></a>
  </p></div></div><div class="navfooter"><table width="100%" summary="Navigation footer" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.apps.html">Application Guide</a><span class="breadcrumbs-sep"> &gt; </span><a href="part.management.html">Information Management</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 6. Evolution: E-mailing and Calendaring" href="cha.gnome.evolution.html"><span>&#9664;</span></a>  <a accesskey="n" title="Chapter 8. Encryption with Passwords and Encryption Keys" href="cha.gnome.crypto.html"><span>&#9654;</span></a></strong></p></div></td></tr></table></div></body></html>

ACC SHELL 2018