PGP Module
  • 13 Aug 2021
  • 3 Minutes to read
  • Dark
    Light
  This documentation version is deprecated, please click here for the latest version.

PGP Module

  • Dark
    Light

Article summary

Overview

The PGP (Pretty Good Privacy) Module is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions. It can also be used to increase the security and confidentiality of email communication. The PGP Module combines symmetric key encryption and public-key encryption. The message is encrypted that uses a symmetric encryption algorithm that requires a symmetric key (session key). Each symmetric key is used only once. The message and its session key are sent to the receiver so the decryption can occur. The message is protected during transmission by encrypting the receiver's public key. The encrypted key can only be decrypted with the symmetric key. The PGP Module can digitally sign a file and verify that the message is authentic. A user signs it with a private key and then verifies the files with a signature. 

The PGP Module installation will be needed to access the below steps. To learn to install a module, see  Installing Modules in Decisions.
The PGP Module cannot be used to generate PGP public and private keys. The PGP Module may be used for building workflows to encrypt or decrypt messages or files. Therefore, public and private keys should be generated with third-party systems.
  • Public Key: locks the message and converts the key into an encrypted file.
  • Private Key: Unlocks the encrypted file key and converts the message back into plain text.


PGP Steps

Clear Sign File

The Clear Sign File step allows users to digitally sign a file using a private key but keeps the file contents in plain text.

Input ParameterDescription
AlgorithmAlgorithm parameter to use. Uses Constant options of MD5, Sha1, RipeMD160, DoubleSha, MD2, Tiger192, and Havel5pass160.
DataFile to be signed
Output File NameFilename to use after the file is completed
Private KeyGenerated key for encrypting or decrypting a file
Private Key PasswordPassword for the private key






Decrypt File


This Decrypt File step takes in the encrypted file output and uses the private key password to unlock the private key. The Decrypt File step then uses the private key to decrypt the encrypted file.

Input ParameterDescription
FileEncrypted file output
Private KeyGenerated key for encrypting or decrypting a file
Private Key PasswordPassword for the private key



Decrypt String


The Decrypt String step takes in the data from the Encrypted String output and uses the private Key Password to unlock the private key string. After the private key is unlocked, the message is decrypted into a string using plain text.

Input ParameterDescription
DataEncrypted String output
Private Key PasswordPassword for the private key
Private Key StringString value of the private key




Encrypt File


The Encrypt File step takes in data contents and encrypts the message.

Input ParametersDescription
BinaryState whether the input file is a binary type
DataFile data to be encrypted
Output File NameFilename of the file after being encrypted
Public KeyPublic key used to encrypt file


 


Encrypt String


The Encrypt String step takes in data and encrypts the data into a string with a public Key String. It allows a user to view the Public Key String in plain text.

Input ParameterDescription
DataString value to encrypt
Public Key StringString value of public key




Sign and Encrypt File

The Sign and Encrypt File step use a private key to digitally sign a file and a public key to encrypt it.

Input ParameterDescription
AlgorithmAlgorithm parameter to use. Uses Constant options of MD5, Sha1, RipeMD160, DoubleSha, MD2, Tiger192, and Havel5pass160.
BinaryState whether the input file is a binary type
DataString value to encrypt
Internal File LabelFile label
Output File NameName for file after sign and encryption
Private KeyGenerated key for encrypting or decrypting a file
Private Key PasswordPassword for the private key
Public KeyPublic key used to encrypt file
With Integrity CheckPerform an integrity check on file




Sign File Step


The Sign File step uses a private key to digitally sign a file. This Step outputs a signed text file and then a Decrypt File step is needed to decrypt and read the file.

Input ParameterDescriptions
AlgorithmAlgorithm parameter to use. Uses Constant options of MD5, Sha1, RipeMD160, DoubleSha, MD2, Tiger192, and Havel5pass160.
BinaryState whether the input file is a binary type
DataString value to encrypt
Internal File LabelFile label
Output File NameName for file after signing
Private KeyGenerated key for encrypting or decrypting a file
Private Key PasswordPassword for the private key




Verify File


The Verify File step takes in the output data and then uses the public key to verify that the digital signature is authentic.

Input ParameterDescription
DataOutput contents of Sign FIle step
Sender Public KeySender public key file 





Was this article helpful?