ACC SHELL
<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 7. Encryption with KGpg</title><link rel="stylesheet" href="susebooks.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="Documentation"><link rel="up" href="part.management.html" title="Part II. Information Management"><link rel="prev" href="cha.gnome.evolution.html" title="Chapter 6. Evolution: E-mailing and Calendaring"><link rel="next" href="cha.gnome.crypto.html" title="Chapter 8. Encryption with Passwords and Encryption Keys"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> > </span><a href="book.apps.html">Application Guide</a><span class="breadcrumbs-sep"> > </span><a href="part.management.html">Information Management</a><span class="breadcrumbs-sep"> > </span><strong><a accesskey="p" title="Chapter 6. Evolution: E-mailing and Calendaring" href="cha.gnome.evolution.html"><span>◀</span></a> <a accesskey="n" title="Chapter 8. Encryption with Passwords and Encryption Keys" href="cha.gnome.crypto.html"><span>▶</span></a></strong></p></div></td></tr></table></div><div class="chapter" title="Chapter 7. Encryption with KGpg"><div class="titlepage"><div><div><h2 class="title"><a name="cha.crypto"></a>Chapter 7. Encryption with KGpg<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#cha.crypto">¶</a></span></h2></div></div></div><div class="toc"><p><b>Contents</b></p><dl><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.why">7.1. Why Signing and Encrypting?</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.keygen">7.2. Generating a New Key Pair</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.mng.export">7.3. Exporting the Public Key</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.mng.import">7.4. Importing Public Keys from Others</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.serv">7.5. The Key Server Dialog</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.kgpg.applet">7.6. Encrypting Your Data</a></span></dt><dt><span class="sect1"><a href="cha.crypto.html#sec.crypto.basics">7.7. For More Information</a></span></dt></dl></div><a class="indexterm" name="idx.encryption"></a><a class="indexterm" name="idx.kgpg"></a><a class="indexterm" name="id527581"></a><p>
You can sign or encrypt data with KGpg, a graphical user interface for
GnuPG. This program helps you to generate and manage all needed keys. Use
its editor function for the quick creation and encryption of files or use
the applet in your panel to encrypt or decrypt by dragging and dropping.
Other programs, such as your mail program (Kontact or Evolution), access
the key data to process signed or encrypted contents. In the following
sections, learn how to execute the following steps necessary for signing
and encrypting data with KGpg:
</p><div class="orderedlist"><ol class="orderedlist" type="1"><li><p>
<a class="xref" href="cha.crypto.html#sec.crypto.kgpg.keygen" title="7.2. Generating a New Key Pair">Generating a New Key Pair</a>
</p></li><li><p>
<a class="xref" href="cha.crypto.html#sec.crypto.kgpg.mng.export" title="7.3. Exporting the Public Key">Exporting the Public Key</a>
</p></li><li><p>
<a class="xref" href="cha.crypto.html#sec.crypto.kgpg.mng.import" title="7.4. Importing Public Keys from Others">Importing Public Keys from Others</a>
</p></li><li><p>
<a class="xref" href="cha.crypto.html#sec.crypto.kgpg.applet" title="7.6. Encrypting Your Data">Encrypting Your Data</a>
</p></li></ol></div><div class="sect1" title="7.1. Why Signing and Encrypting?"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.why"></a>7.1. Why Signing and Encrypting?<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.why">¶</a></span></h2></div></div></div><div class="variablelist"><dl><dt><span class="term">Signing</span></dt><dd><p>
Signing means attaching electronic signatures to mails (or even
software) to prove its origin. To avoid someone writing mails using
your name and to protect both you and the recipients, you should sign
your mails. Signatures help you to easily check the sender of the
mails you receive and to distinguish authentic from malicious mails.
</p><p>
Software developers sign their software so you are able to check its
integrity. Even if you have the software from an unofficial server,
you can verify the package with the signature.
</p></dd></dl></div><div class="variablelist"><dl><dt><span class="term">Encrypting</span></dt><dd><p>
You might have sensitive information you want to protect from other
parties. Encrypting helps you to transform data and make it unreadable
for others. This is especially important for companies who must
protect internal information as well as the employees' privacy.
</p></dd></dl></div></div><div class="sect1" title="7.2. Generating a New Key Pair"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.keygen"></a>7.2. Generating a New Key Pair<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.keygen">¶</a></span></h2></div></div></div><a class="indexterm" name="id527713"></a><p>
To be able to exchange encrypted messages with other users, first
generate your own key pair. One part of it—the <span class="emphasis"><em>public
key</em></span>—is distributed to your communication partners, who
can use it to encrypt the files or e-mail messages they send. The other
part of the key pair—the <span class="emphasis"><em>private key</em></span>—is
used to decrypt the encrypted contents.
</p><div class="important"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Important: Private Key versus Public Key"><tr class="head"><td width="32"><img alt="[Important]" src="admon/important.png"></td><th align="left">Private Key versus Public Key</th></tr><tr><td colspan="2" align="left" valign="top"><p>
Only you should have access to the private key. Do not grant other users
access to this data.
</p><p>
Your private key is protected with a passphrase. Choose the passphrase
carefully: do not use words from a dictionary, and mix alphabetic with
non-alphabetic characters.
</p></td></tr></table></div><p>
To create a new pair, proceed as follows:
</p><div class="procedure"><ol class="procedure" type="1"><li><p>
<a class="indexterm" name="id527762"></a>
Start KGpg from the main menu or press <span class="keycap">Alt</span>+<span class="keycap">F2</span> and enter
<span class="command"><strong>kgpg</strong></span>. When you start the program for the first time,
a wizard appears, guiding you through the configuration. Follow the
instructions up to the point where you are prompted to create a key.
</p></li><li><p>
Select <span class="guimenu">Keys</span>+<span class="guimenu">Generate Key
Pair</span>, if you want to create a new key pair.
</p><div class="figure"><a name="fig.kgpg_keygen"></a><p class="title"><b>Figure 7.1. KGpg: Creating a Key</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_keygen">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="35%"><tr><td><img src="images/kgpg_keygen.png" width="100%" alt="KGpg: Creating a Key"></td></tr></table></div></div></div><br class="figure-break"></li><li><p>
Enter a name, an e-mail address, and optionally, a comment. If you do
not like the default settings provided, also set the expiration time
for the key, the key size, and the encryption algorithm used.
</p></li><li><p>
To generate a standard key, confirm your settings with
<span class="guimenu">OK</span>. After clicking <span class="guimenu">OK</span>, a dialog
prompts you to enter a passphrase twice. The passphrase protects your
private key. The relative strength of your chosen password is measured
and displayed by the <span class="guimenu">Password strength meter</span>. The
key pair will be generated. This can take some time.
</p><div class="note"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Note: Expert Mode"><tr class="head"><td width="32"><img alt="[Note]" src="admon/note.png"></td><th align="left">Expert Mode</th></tr><tr><td colspan="2" align="left" valign="top"><p>
If you are an experienced user, use the <span class="guimenu">Expert Mode</span>
to define additional options. This takes you to a terminal window
where you can set the type of key to be generated, the key size (in
bits) and the date of expiration. After entering your name and email
address, you are prompted for a passphrase to protect your private
key.
</p></td></tr></table></div></li><li><p>
After the key generation is finished, a summary will be displayed. Save
and print the revocation certificate and keep it in a save place. You
will need the certificate to revoke your passphrase if you forgot it.
After you have confirmed with <span class="guimenu">OK</span>, KGpg displays its
main window and you are finished.
</p><div class="figure"><a name="fig.kgpg_manager"></a><p class="title"><b>Figure 7.2. KGpg Main Window: Key Management</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_manager">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="70%"><tr><td><img src="images/kgpg_manager.png" width="100%" alt="KGpg Main Window: Key Management"></td></tr></table></div></div></div><br class="figure-break"></li></ol></div><p>
The main window shows the keys that belong to your key ring: your own key
and the keys from other persons that you have already imported. As GnuPG
uses a more sophisticated implementation of key pairs, for each user
name, several sub keys are displayed but these can be neglected for the
purpose of this chapter. Apart from some other details (like expiration
date or creation date of the key and the ID), the main windows also shows
the level of trust for each key, indicated by colors. White means that
the trust level is unknown, blue indicates a high level of trust. For
more information, see <a class="xref" href="cha.crypto.html#sec.crypto.kgpg.mng.trust" title="7.4.2. Trusting Keys">Section 7.4.2, “Trusting Keys”</a>.
</p><div class="note"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Note: KGpg Icon and Main Window"><tr class="head"><td width="32"><img alt="[Note]" src="admon/note.png"></td><th align="left">KGpg Icon and Main Window</th></tr><tr><td colspan="2" align="left" valign="top"><p>
When you start KGpg in later sessions, only a small icon with a padlock
appears in the system tray. Click that icon to display the main KGpg
window on your desktop.
</p></td></tr></table></div></div><div class="sect1" title="7.3. Exporting the Public Key"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.mng.export"></a>7.3. Exporting the Public Key<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.export">¶</a></span></h2></div></div></div><a class="indexterm" name="id527978"></a><p>
After generating your key pair, make the public key available to other
users. This enables them to use it to encrypt or sign the messages or
files they send you. For example, if you want to encrypt a message for
user tux, you encrypt it using tux' public key. To
decrypt the message, tux uses his private key. If tux
wants to send you a message, he encrypts it using your public key and you
decrypt the message with your private key.
</p><p>
To make the public key available for others, select <span class="guimenu">Keys</span>+<span class="guimenu">Export Public Keys</span>. The dialog that opens offers four options:
</p><div class="variablelist"><dl><dt><span class="term"><span class="guimenu">Email</span>
</span></dt><dd><p>
Your public key is sent to a recipient of your choice by email. If you
activate this option and confirm with <span class="guimenu">OK</span>, the
dialog for creating a new email message with your default mail program
appears. Enter the recipient and click <span class="guimenu">Send</span>. The
recipient receives your key and can then send you encrypted contents.
</p></dd><dt><span class="term"><span class="guimenu">Clipboard</span>
</span></dt><dd><p>
You can place your public key here before continuing to process it.
</p></dd><dt><span class="term"><span class="guimenu">Default Key Server</span>
</span></dt><dd><p>
To make your public key available to a wide audience, export it to one
of the key servers on the Internet. For more information, refer to
<a class="xref" href="cha.crypto.html#sec.crypto.kgpg.serv" title="7.5. The Key Server Dialog">Section 7.5, “The Key Server Dialog”</a>.
</p></dd><dt><span class="term"><span class="guimenu">File</span>
</span></dt><dd><p>
If you prefer to distribute your key as a file on a data medium
instead of sending it by email, click this option, confirm or change
the file path and name, and click <span class="guimenu">OK</span>.
</p></dd></dl></div></div><div class="sect1" title="7.4. Importing Public Keys from Others"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.mng.import"></a>7.4. Importing Public Keys from Others<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.import">¶</a></span></h2></div></div></div><a class="indexterm" name="id528100"></a><p>
If you receive a key in a file (for example, as an e-mail attachment),
integrate it in your key ring with <span class="guimenu">Import Key</span> and use
it for encrypted communication with the sender. You can also import keys
from a public server if the person you want to communicate with has
stored his public key there. For more information, see
<a class="xref" href="cha.crypto.html#sec.crypto.kgpg.serv" title="7.5. The Key Server Dialog">Section 7.5, “The Key Server Dialog”</a>. The procedure is similar to
the procedure for exporting keys already described.
</p><div class="sect2" title="7.4.1. Signing Keys"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.mng.sign"></a>7.4.1. Signing Keys<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.sign">¶</a></span></h3></div></div></div><a class="indexterm" name="id528131"></a><p>
Keys can be signed like every other file to guarantee their authenticity
and integrity. If you are absolutely sure an imported key belongs to the
individual specified as the owner, express your trust in the
authenticity of the key with your signature.
</p><div class="important"><table border="0" cellpadding="3" cellspacing="0" width="100%" summary="Important: Establishing a Web of Trust"><tr class="head"><td width="32"><img alt="[Important]" src="admon/important.png"></td><th align="left">Establishing a Web of Trust</th></tr><tr><td colspan="2" align="left" valign="top"><p>
Encrypted communication is only secure to the extent that you can
positively associate public keys in circulation with the specified
user. By cross-checking and signing these keys, you contribute to the
establishment of a Web of Trust. For these reasons, make really sure
you only sign keys you have personally checked.
</p></td></tr></table></div><p>
Before you can use your key, you need to sign it yourself.
</p><div class="procedure" title="Procedure 7.1. Signing A Key"><a name="id528162"></a><p class="title"><b>Procedure 7.1. Signing A Key</b></p><ol class="procedure" type="1"><li><p>
Select the key to sign in the key list in the <span class="guimenu">Key Management
</span> window.
</p></li><li><p>
Select <span class="guimenu">Keys</span>+<span class="guimenu">Sign
Keys</span>.
</p></li><li><p>
Select the private key to use for the signature. An alert reminds you
to check the authenticity of this key before signing it. In the drop
down list, select how you carefully you have checked that the key
belongs to the person with whom you want to communicate.
</p></li><li><p>
Click <span class="guimenu">Continue</span> and enter your passphrase in the
next step. With entering the passphrase, you sign the key with your
own private key. The signed key now appears green in the trust column.
</p></li></ol></div><p>
Other users can now check the signature by means of your public key.
</p></div><div class="sect2" title="7.4.2. Trusting Keys"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.mng.trust"></a>7.4.2. Trusting Keys<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.mng.trust">¶</a></span></h3></div></div></div><a class="indexterm" name="id528235"></a><p>
Normally, you are asked by the corresponding program whether you trust
the key, or rather, whether you assume it is really used by its
authorized owner. This happens each time a message needs to be decrypted
or a signature has to be checked. To avoid this, edit the trust level of
the newly imported key. To trust a key and set a certain trust level, do
the following:
</p><div class="procedure"><ol class="procedure" type="1"><li><p>
Right-click the key and select <span class="guimenu">Key Properties</span>.
</p></li><li><p>
Adjust the trust level in the <span class="guimenu">Owner Trust</span> drop-down
list. This value indicates how much you trust the owner of this key to
correctly verify the identity of the keys he signs.
</p></li><li><p>
Close the property dialog. If you have set the trust level to
<span class="guimenu">Fully</span> or <span class="guimenu">Ultimately</span>, the key now
appears blue in the trust column.
</p></li></ol></div><p>
The lower the trust level is, the less you trust the signer of the key
to have checked the true identity of the keys signed. You may be
entirely sure about the signer's identity, but this user may not check
other people's identities properly before signing their keys. Notice
that the trust level does not trigger any automatic actions by KGpg.
</p></div></div><div class="sect1" title="7.5. The Key Server Dialog"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.serv"></a>7.5. The Key Server Dialog<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.serv">¶</a></span></h2></div></div></div><a class="indexterm" name="id528310"></a><p>
Several Internet-based key servers offer the public keys of many users.
To engage in encrypted communication with a large number of users, use
these servers to distribute your public key. For this purpose, export
your public key to one of these servers. Similarly, KGpg enables you to
search one of these servers for the keys of certain people and import
their public keys from the server. Open the key server dialog with
<span class="guimenu">File</span>+<span class="guimenu">Key Server Dialog</span>.
</p><div class="sect2" title="7.5.1. Importing a Key from a Key Server"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.serv.import"></a>7.5.1. Importing a Key from a Key Server<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.serv.import">¶</a></span></h3></div></div></div><a class="indexterm" name="id528346"></a><p>
By means of the <span class="guimenu">Import</span> tab in the key server dialog,
import public keys from one of the Internet-based key servers. Select
one of the preconfigured key servers and enter a search string (e-mail
address of the communication partner) or the ID of the key to find. When
you click <span class="guimenu">Search</span>, your system connects to the
Internet and searches the specified key server for a key that matches
your specifications.
</p><div class="figure"><a name="fig.kgpg_servimp"></a><p class="title"><b>Figure 7.3. Search Screen for Importing a Key</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_servimp">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="40%"><tr><td><img src="images/kgpg_servimp.png" width="100%" alt="Search Screen for Importing a Key"></td></tr></table></div></div></div><br class="figure-break"><p>
If your search on the key server is successful, a list of all retrieved
server entries is displayed in a new window. Select the key to include
in your key ring and click <span class="guimenu">Import</span>. Confirm the
following message with <span class="guimenu">OK</span>, then exit the key server
dialog with <span class="guimenu">Close</span>. The imported key then appears in
the main overview of the key manager and is ready for use.
</p></div><div class="sect2" title="7.5.2. Exporting Your Keys to a Key Server"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.serv.export"></a>7.5.2. Exporting Your Keys to a Key Server<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.serv.export">¶</a></span></h3></div></div></div><a class="indexterm" name="id528434"></a><p>
To export your key to one of the freely accessible key servers on the
Internet, select the <span class="guimenu">Export</span> tab in the key server
dialog. Designate the target server and the key to export by means of
two drop-down menus. Then start the export with
<span class="guimenu">Export</span>.
</p><div class="figure"><a name="fig.kgpg_servexp"></a><p class="title"><b>Figure 7.4. Exporting a Key to a Key Server</b><span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#fig.kgpg_servexp">¶</a></span></p><div class="figure-contents"><div class="mediaobject"><table border="0" summary="manufactured viewport for HTML img" cellspacing="0" cellpadding="0" width="40%"><tr><td><img src="images/kgpg_servexp.png" width="100%" alt="Exporting a Key to a Key Server"></td></tr></table></div></div></div><br class="figure-break"></div></div><div class="sect1" title="7.6. Encrypting Your Data"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.kgpg.applet"></a>7.6. Encrypting Your Data<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.applet">¶</a></span></h2></div></div></div><a class="indexterm" name="id528506"></a><a class="indexterm" name="id528516"></a><a class="indexterm" name="id528526"></a><p>
After you have generated your key pair, exported your public key and
imported public keys from others, you can also send or receive encrypted
mails. Refer to <a class="xref" href="cha.kontact.html#sec.kontact.mail.crypto" title="5.2.5. Signing and Encrypting emails">Section 5.2.5, “Signing and Encrypting emails”</a> to learn
how to make use of those options in KMail.
</p><p>
KGpg also offers the possibility to encrypt text.
To open the integrated editor choose <span class="guimenu">File</span>+<span class="guimenu">Open Editor</span>.
</p><div class="sect2" title="7.6.1. Encrypting and Decrypting from a File Manager"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.dnd"></a>7.6.1. Encrypting and Decrypting from a File Manager<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.dnd">¶</a></span></h3></div></div></div><p>
KGpg is also integrated into file managers like Dolphin or Konqueror.
Generally, PGP-encrypted files are designated with the suffix
<code class="filename">asc</code>. There are several options how to encrypt or
decrypt files inside a File Manager:
</p><div class="variablelist"><dl><dt><span class="term"><span class="guimenu">Encrypt a File</span>
</span></dt><dd><p>
To encrypt a file inside a File Manager, right-click the file and
select <span class="guimenu">Actions</span>+<span class="guimenu">Encrypt
File</span>. Choose one of the trusted keys in the
dialog. After clicking <span class="guimenu">OK</span> in the dialog, a new
file with the <code class="filename">asc</code> suffix will be created in the
same directory.
</p></dd><dt><span class="term"><span class="guimenu">Decrypt a File on the fly</span>
</span></dt><dd><p>
To decrypt an encrypted file instantly, right-click the file and
select <span class="guimenu">Open with KGpg</span>. If
the original filename already exists, a dialog opens that asks how to
name the file or if it should be overwritten. KGpg prompts for the
password of your private key and saves the decrypted file in the same
directory.
</p></dd><dt><span class="term"><span class="guimenu">Decrypt with the editor</span>
</span></dt><dd><p>
To decrypt an encrypted file with the editor, right-click the file in
the File Manager and select <span class="guimenu">Actions</span>+<span class="guimenu">View file decrypted</span>.
</p></dd></dl></div></div><div class="sect2" title="7.6.2. The KGpg Editor"><div class="titlepage"><div><div><h3 class="title"><a name="sec.crypto.kgpg.edit"></a>7.6.2. The KGpg Editor<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.kgpg.edit">¶</a></span></h3></div></div></div><a class="indexterm" name="id528658"></a><p>
Instead of creating contents for encryption in an external editor then
encrypting the file with one of the methods described above, you can use
the integrated editor of KGpg. To open the editor, select <span class="guimenu">File</span>+<span class="guimenu">Open Editor</span>. In
the editor, enter the desired text (or copy it into the editor from the
clipboard or any file), and click <span class="guimenu">Encrypt</span>. Then
select the key to use and complete the encryption procedure. To decrypt
files, use <span class="guimenu">Decrypt</span> and enter the password associated
with the key.
</p><p>
Generating and checking signatures is just as easy as encrypting
directly from the editor. Go to <span class="guimenu">Signature</span>+<span class="guimenu">Generate Signature</span> and select the file to sign from the file dialog. Select
the private key to use and enter the associated password. KGpg informs
you of the successful generation of the signature. Files can also be
signed from the editor by simply clicking
<span class="guimenu">Sign/Verify</span>. To check a signed file, go to
<span class="guimenu">Signature</span>+<span class="guimenu">Verify
Signature</span> and select the file to check in the
following dialog. After you confirm the selection, KGpg checks the
signature and reports the result of the operation. Another possibility
is to load the signed file into the editor and click
<span class="guimenu">Sign/Verify</span>.
</p></div></div><div class="sect1" title="7.7. For More Information"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sec.crypto.basics"></a>7.7. For More Information<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#sec.crypto.basics">¶</a></span></h2></div></div></div><p>
For comprehensive background information about the encryption method,
refer to the GnuPG project pages at
<a class="ulink" href="http://www.gnupg.org/documentation/index.en.html" target="_top">http://www.gnupg.org/documentation/index.en.html</a>.
<a class="indexterm" name="id528740"></a>
<a class="indexterm" name="id528747"></a>
</p></div></div><div class="navfooter"><table width="100%" summary="Navigation footer" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> > </span><a href="book.apps.html">Application Guide</a><span class="breadcrumbs-sep"> > </span><a href="part.management.html">Information Management</a><span class="breadcrumbs-sep"> > </span><strong><a accesskey="p" title="Chapter 6. Evolution: E-mailing and Calendaring" href="cha.gnome.evolution.html"><span>◀</span></a> <a accesskey="n" title="Chapter 8. Encryption with Passwords and Encryption Keys" href="cha.gnome.crypto.html"><span>▶</span></a></strong></p></div></td></tr></table></div></body></html>
ACC SHELL 2018