In this week’s work, we set the product as file encryption upload and test, so we need to select an encrypted file when uploading the file. This paper records the process of encrypting the file and uploading it to the target website using GPG4WIN graphics front end in Windows system.

GPG

GPG, also known as GnuPG, stands for Gnu Private Guard. GPG is a powerful encryption software with PGP algorithm as its core.

GPG uses asymmetric encryption, which means encrypting files with public keys and decrypting files with private keys. If you need to send an encrypted message, first obtain the recipient’s public key, and then use the public key to encrypt and transmit the message. The recipient can decrypt the message using the corresponding private key. That is, the public key is the lock and the private key is the key. Asymmetric encryption solves the problem of transmitting information well.

GPG4WIN

The GPG project is a command line program designed for open source operating systems such as Linux. Fortunately, developers have developed a lot of graphics front-end for GPG and migrated it to Windows platform. Gpg4win is a collection of GPG and graphics front-end installation package for Windows platform. This article will introduce how to use the graphics front-end in Gpg4win, not the command line method of GPG.

Download link and trampling record:

The official website download address www.gpg4win.org/ after downloading the default options can be installed, (there are Chinese options, the owner of the building only configured the installation directory, the other are not stop next ~) Installation encountered some problems recorded as follows:

Q1. Do I have to pay to download?

——NO! If you don’t want to pay, just click 0 to download it

Q2. Can’t open exe?

——- right-click – administrator permission to run

Q3. Do I need administrator privileges to install software and I don’t know the Password of the Adminstrator account?

—— After the installation, close the authentication box for entering the account and password. The system automatically changes to non-authentication installation

Cryptographic operations

Once installed, the icon is this punk beauty

We run it, the first run will require configuration password, do remember this password, subsequent encryption, decryption will use

Then we go to this page and ask us to create or import a key, in several cases: A. Encrypt for yourself; B. Encrypt for others; C. Only the signature is not encrypted. We’ll talk about it case by case

A. Encrypt the password for yourself

Click “New key pair” and you will be asked to enter your name and email address. Click “New key” and you will have your own key

Then click the upper left corner [encryption/signature], select the file to be encrypted open, check encrypt for me, click signature/encryption, configure the encryption file name can be ~ encrypted file copy to someone else’s computer without the key can not be opened

B. Encrypt for others

Website upload generally use this method, on the website to open the encryption file switch, there will be a button to download the key

After we download, click import, select the key that has just been imported and downloaded, you can create an encrypted file that can be recognized by this website

Obtain the Key from the website: status Choose ON > Cenerate a New Key for the first time >Download To Download the Key

Then open Kleopatra, select “Import” above the key just downloaded and authenticate, we can start to generate the encrypted file of the exclusive website

Then click on the top left corner > select encryption/signature 】 【 to encrypt files open > checked into: encryption for others > type in the name of the private key just configured import > single encryption/signature each file > > click signature/encryption configuration can be encrypted file name ~ encrypted files for others even if there is the key of others on your computer can’t open

C. Only the signature is not encrypted

For signatures please refer to this post blog.csdn.net/weixin_3953…

The document signature is used to protect the document itself. If the original document is tampered with, it can prove that it is not the original author. This function is often used for software distribution. Many software developers use signature to protect their software from being decompiled and injected with harmful code.