PGP Encryption Cheat-Sheet
REV 1.0
Overview
There are many ways to securely share information between two parties. Email is generally NOT one of them. This document outlines the basics of encrypting a file using the PGP encryption method and the freely available GPG utilities (https://gnupg.org/). The following are alternatives for popular desktop environments:
- Windows - https://www.gpg4win.org/
- macOS - https://gpgtools.org/
The following is not an exhaustive tutorial of using GPG, but should allow someone to securely encrypt a file given the public key of someone. For details of using GPG, see the following:
https://gnupg.org/documentation/index.html
Step 1 - File to encrypt
First step is to have a file that needs to be encrypted. For this example it will be a simple text file called “secrets.txt”:
Step 2 - Import public key
You will need the public key for the person you are sending the file to. In this case it will be the public key for “mark.rank@cirrusidentity.com”:
To import, use the following command:
Step 3 - Encrypt file
To encrypt the file, use the following commands:
Notes:
- Since the user ID was not specified on the command line, it asks for which key to use. Since you are sending to “mark.rank@cirrusidentity.com”, that is the user ID.
- The –armor switch will generate a text based output (which will be safer to send via email)
- The warning is expected and is because the identity of the key has not been validated.
Step 4 - Send
There should now be a file ending in “.asc” that contains the encrypted message. This can now be sent via email or other method.
Posts by Tag
- Cirrus Customer Success (18)
- SAML (6)
- Federated Identity Management (4)
- Identity and Access Management (4)
- Access Management (3)
- Entra ID (3)
- Log API (3)
- Webinars (3)
- CAS (2)
- DNS Add-On (2)
- Identity Management (2)
- Identity Provider (2)
- REFED (2)
- Security (2)
- eduroam (2)
- Access Control (1)
- Alumni (1)
- Applicant Experience (1)
- Authentication (1)
- Bridge (1)
- CAF - Canadian Access Federation (1)
- Cirrus Identity (1)
- External (1)
- Higher Education (1)
- Identity Lifecycle Management (1)
- Identity Provider Proxy (1)
- Implementation (1)
- InCommon (1)
- Learning Center (1)
- Partnerships (1)
- Social Identity (1)
- Social Login (1)