Cryptography Software - gpg (GNU Privacy Guard)

About

gpg (GNU Privacy Guard, GPG or GnuPG) is a cryptographic software of the pgp class that permits to:

easily another sort of message or file.

In general, the terms GnuPG, GPG, GNU Privacy Guard, OpenPGP and PGP are used interchangeably.

Technically:

  • pgp (OpenPGP / Pretty Good Privacy) is the encryption standard,
  • Gpg is the program that implements the standard.





Discover More
Git - Tag

This page is tagging in git Git has the ability to tag specific points in history as being important. Typically this functionality is used to mark release points (v1.0, and so on). Git uses two main...
Certificate Validity Period Not Before Not After Portecle
Identification Material - Certificate (or Public Key Certificate)

A certificate is a document which permits to define with certainty the owner of the private key (ensures that the party you are communicating with is whom you think.) because it's digitally signed A certificate...
Card Puncher Data Processing
Maven - Sign

When you want to sign the artifact, the POM, and all attached artifacts Binds by default to the lifecycle phase: verify. where;
Gpg Kleopatra
Pgp (Pretty Good Privacy)

PGP (Pretty Good Privacy) (or OpenPGP) is a standard defined by 4880RFC4880 (OpenPGP Message Format) that define how to securely provide: electronic communications (email) and data storage services....
Porte Cle Keystore Pem
Privacy-Enhanced Mail (PEM) (OpenSsh key format)

Privacy-Enhanced Mail (PEM) is a file formats for cryptographic material (key, certificate, ..). The PEM format is the DER format encoded in base64 with additional header and footer lines to be transported...
Public Key Server (keyserver)

In a public key infrastructure, a public key server is a server that stores and make the public key available to the public. You can think of the keyserver as a phonebook where people: can look up...
Trust model - Web of trust

A web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner. It decentralizes authentication of...
Certificate Usage
What are the possible usages of a cryptographic certificate?

A certificate may have one or more several usages. This articles list them and show you how to discover the usage also known as certificat purpose. extensions A certificate can be used for one or...
What is a Public Key Cryptography (known as Asymmetric Cipher) ?

(Public Key Cryptography|Asymmetric Cipher) Public key cryptography is a cryptographic system from the 70's that uses pairs of keys It's also known as: * asymmetric cryptography) * non-secret...



Share this page:
Follow us:
Task Runner