- 13 Aug 2021
- 3 Minutes to read
- Print
- DarkLight
PGP Module
- Updated on 13 Aug 2021
- 3 Minutes to read
- Print
- DarkLight
Overview
The PGP (Pretty Good Privacy) Module is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions. It can also be used to increase the security and confidentiality of email communication. The PGP Module combines symmetric key encryption and public-key encryption. The message is encrypted that uses a symmetric encryption algorithm that requires a symmetric key (session key). Each symmetric key is used only once. The message and its session key are sent to the receiver so the decryption can occur. The message is protected during transmission by encrypting the receiver's public key. The encrypted key can only be decrypted with the symmetric key. The PGP Module can digitally sign a file and verify that the message is authentic. A user signs it with a private key and then verifies the files with a signature.
- Public Key: locks the message and converts the key into an encrypted file.
- Private Key: Unlocks the encrypted file key and converts the message back into plain text.
PGP Steps
Clear Sign File
The Clear Sign File step allows users to digitally sign a file using a private key but keeps the file contents in plain text.
Input Parameter | Description |
---|---|
Algorithm | Algorithm parameter to use. Uses Constant options of MD5, Sha1, RipeMD160, DoubleSha, MD2, Tiger192, and Havel5pass160. |
Data | File to be signed |
Output File Name | Filename to use after the file is completed |
Private Key | Generated key for encrypting or decrypting a file |
Private Key Password | Password for the private key |
Decrypt File
This Decrypt File step takes in the encrypted file output and uses the private key password to unlock the private key. The Decrypt File step then uses the private key to decrypt the encrypted file.
Input Parameter | Description |
---|---|
File | Encrypted file output |
Private Key | Generated key for encrypting or decrypting a file |
Private Key Password | Password for the private key |
Decrypt String
The Decrypt String step takes in the data from the Encrypted String output and uses the private Key Password to unlock the private key string. After the private key is unlocked, the message is decrypted into a string using plain text.
Input Parameter | Description |
---|---|
Data | Encrypted String output |
Private Key Password | Password for the private key |
Private Key String | String value of the private key |
Encrypt File
The Encrypt File step takes in data contents and encrypts the message.
Input Parameters | Description |
---|---|
Binary | State whether the input file is a binary type |
Data | File data to be encrypted |
Output File Name | Filename of the file after being encrypted |
Public Key | Public key used to encrypt file |
Encrypt String
The Encrypt String step takes in data and encrypts the data into a string with a public Key String. It allows a user to view the Public Key String in plain text.
Input Parameter | Description |
---|---|
Data | String value to encrypt |
Public Key String | String value of public key |
Sign and Encrypt File
The Sign and Encrypt File step use a private key to digitally sign a file and a public key to encrypt it.
Input Parameter | Description |
---|---|
Algorithm | Algorithm parameter to use. Uses Constant options of MD5, Sha1, RipeMD160, DoubleSha, MD2, Tiger192, and Havel5pass160. |
Binary | State whether the input file is a binary type |
Data | String value to encrypt |
Internal File Label | File label |
Output File Name | Name for file after sign and encryption |
Private Key | Generated key for encrypting or decrypting a file |
Private Key Password | Password for the private key |
Public Key | Public key used to encrypt file |
With Integrity Check | Perform an integrity check on file |
Sign File Step
The Sign File step uses a private key to digitally sign a file. This Step outputs a signed text file and then a Decrypt File step is needed to decrypt and read the file.
Input Parameter | Descriptions |
---|---|
Algorithm | Algorithm parameter to use. Uses Constant options of MD5, Sha1, RipeMD160, DoubleSha, MD2, Tiger192, and Havel5pass160. |
Binary | State whether the input file is a binary type |
Data | String value to encrypt |
Internal File Label | File label |
Output File Name | Name for file after signing |
Private Key | Generated key for encrypting or decrypting a file |
Private Key Password | Password for the private key |
Verify File
The Verify File step takes in the output data and then uses the public key to verify that the digital signature is authentic.
Input Parameter | Description |
---|---|
Data | Output contents of Sign FIle step |
Sender Public Key | Sender public key file |