Cryptography Software - gpg (GNU Privacy Guard)

About

gpg (GNU Privacy Guard, GPG or GnuPG) is a cryptographic software that implements the pgp standard.

It permits to:

easily another sort of message or file.

In general, the terms GnuPG, GPG, GNU Privacy Guard, OpenPGP and PGP are used interchangeably.

Technically:

  • pgp (OpenPGP / Pretty Good Privacy) is the encryption standard,
  • Gpg is the program that implements the standard.





Discover More
Git - Tag

This page is tagging in git Git has the ability to tag specific points in history as being important. Typically this functionality is used to mark release points (v1.0, and so on). Git uses two main...
Card Puncher Data Processing
Maven - Sign

When you want to sign the artifact, the POM, and all attached artifacts Binds by default to the lifecycle phase: verify. where;
Gpg Kleopatra
Pgp (Pretty Good Privacy)

PGP (Pretty Good Privacy) (or OpenPGP) is a standard defined by 4880RFC4880 (OpenPGP Message Format) that define how to securely provide: electronic communications (email) and data storage services....
Porte Cle Keystore Pem
Privacy-Enhanced Mail (PEM) (OpenSsh key format)

Privacy-Enhanced Mail (PEM) is a file formats for cryptographic material (key, certificate, ..). The PEM format is the DER format encoded in base64 with additional header and footer lines to be transported...
Public Key Server (keyserver)

In a public key infrastructure, a public key server is a server that stores and make the public key available to the public. You can think of the keyserver as a phonebook where people: can look up...
Trust model - Web of trust

A web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner. It decentralizes authentication of...
Certificate Usage
What are the possible usages of a cryptographic certificate?

A certificate may have one or more several usages. This articles list them and show you how to discover the usage also known as certificat purpose. extensions A certificate can be used for one or...
What is a Public Key Cryptography (known as Asymmetric Cipher) ?

Public key cryptography is a cryptographic system from the 70's that uses pairs of keys It's also known as: asymmetric cryptography) non-secret encryption Public key cryptography is used by Internet...



Share this page:
Follow us:
Task Runner