LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-27-2005, 06:32 PM   #1
maginotjr
Member
 
Registered: Aug 2004
Location: BR - Floripa
Distribution: Ubuntu 9.10 - 2.6.x.x
Posts: 661

Rep: Reputation: 35
How Digital Certification works?


I want to know better about Digital Encryptation and so on... I have downloaded GnuPG and created 2 Encryptation Keys with 4048 bits using RSA, I run gpg -e <file> and give the desired key, but how works this thing of public key and sending and receiving encrypted messages??

I have downloaded an extension to Thunderbird that encrypt my messages using gpg but I dont know how this could help-me... the other side have to have gpg too and know my password?? So whats the meaning of the Public Key ?? Please give-me a direct answer, I have read most things on gpg site and still have this doubt... for example when seeing some sites in the bottom there are a gpg key that gives a ASCII file with some encrypts... so what the meaning of this in the sites?

For e.g this is taken from 2600 website (http://www.2600.com/magazine/):
Code:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>

mQGiBEBEVc4RBADGttlbeaEmWc1eYMHikPF6S2av/ku2fIgHFuVX5GJHzx3pGvM1
D73G3PwW/ccUnZohv9agZ6KYudk4x66zt19EYg/gv9QCFVPUG0yu/XFVBnm8xxD3
cYD2VSExycDPFQRRITDwRQ8da+H9Y0DEtcRCkqdZ2QDWfIh1t5c0mFxN+wCg/6Aw
iTL/IWgHd9xSM/zjZYJfl4MD/2WwH2Xo6+wUE6tsz+VPztGyy7H2WcdZoe2jZ6rh
jrFW5ZzIVsV3mrQJr1dBCNTHu44brdsO9AS+F7G8zbG+fqFbCdYHIKPq2rT75mS2
E0vzo7v4qGSujbiqxsHnnf0cHLttzPydjv6BJ/e/PuDQUpOfdIj2JjIM7e8C59lA
B+ZjA/4hNGJszSkb0bGuPXw/wjlHA8zGFdJyI4jKif9VDOfVxmlUGRxu8yl7AcsU
7142PmX5bXVjPYyViOLbl77PvYvMogY1qEA5X+oSHQPGkOR6vDMv+pCFqiSWTQR9
d8FdvXRdqfgJeGM93NT7O2MrfONb/dZkl1YZkbnX5tXm/itqmrQiMjYwMCBNYWdh
emluZSA8d2VibWFzdGVyQDI2MDAuY29tPokASwQQEQIACwUCQERVzgQLAwIBAAoJ
EBvatewC4Ge0Ko8AoIE7BQeXnD3h4/I6IAD1QrYXVMZUAKD1jBJq6R10JK0iN4zs
ub6DZ41QkrkEDQRARFXPEBAA+RigfloGYXpDkJXcBWyHhuxh7M1FHw7Y4KN5xsnc
egus5D/jRpS2MEpT13wCFkiAtRXlKZmpnwd00//jocWWIE6YZbjYDe4QXau2FxxR
2FDKIldDKb6V6FYrOHhcC9v4TE3V46pGzPvOF+gqnRRh44SpT9GDhKh5tu+Pp0NG
CMbMHXdXJDhK4sTw6I4TZ5dOkhNh9tvrJQ4X/faY98h8ebByHTh1+/bBc8SDESYr
Q2DD4+jWCv2hKCYLrqmus2UPogBTAaB81qujEh76DyrOH3SET8rzF/OkQOnX0ne2
Qi0CNsEmy2henXyYCQqNfi3t5F159dSST5sYjvwqp0t8MvZCV7cIfwgXcqK61qlC
8wXo+VMROU+28W65Szgg2gGnVqMU6Y9AVfPQB8bLQ6mUrfdMZIZJ+AyDvWXpF9Sh
01D49Vlf3HZSTz09jdvOmeFXklnN/biudE/F/Ha8g8VHMGHOfMlm/xX5u/2RXscB
qtNbno2gpXI61Brwv0YAWCvl9Ij9WE5J280gtJ3kkQc2azNsOA1FHQ98iLMcfFst
jvbzySPAQ/ClWxiNjrtVjLhdONM0/XwXV0OjHRhs3jMhLLUq/zzhsSlAGBGNfISn
CnLWhsQDGcgHKXrKlQzZlp+r0ApQmwJG0wg9ZqRdQZ+cfL2JSyIZJrqrol7DVes9
1hcAAgIP/jc9FRX7nQK3riaSJX8EZTQc1cqU417tOCUIhImzd1xGmHY1hoCVWnND
ZCk/2dgpiXfPnpsRjiG5zfktqdcZQm11eJE0J8rdLhZPkXzQROJjIUaKPaoCHHne
eAbFhsnO1m5ngZJyRNizmsbiJGr30wZKUkzDGiToysiXF7B7BuW2ZDHPzjkFfVi/
WH0FFYNDORb3XjfU13CgrbffJ7DtNbHnX62GUE+HDhgAaRod1l26zz8d/aNQhxrw
35M2lBln0DdtYhKIJZm9UVylwsMPzquYJ5/dHrsHDwcE6g+4MCdgAHv33C1+xOp6
v6D9WvWQDTJqDUF3XJdFiZHMZuXgFv0HFKkzyXsvTEmNng/+Zb5ryp+4HGz4PGNW
bOGN6jO5QCC9XwmN2BIAiB83Zl1kE7x42DnhrS+4IYkL85oNcZSnvwJ7D5otDCcw
zOdmRHxuOQNfJXIJKWxmA66jtgm9nHAcljbDk/Pae26P6jJLaCCDMcQmGQw9E2Eh
BzjDTgdbLV/IE3G0MvxbZbqSWh0kb+jifKwieW588/KDgXzi77B1WNdOWrIOXh9s
mHN/kfgYERLb031J6PJ6MFZnFCJX03AreAPJCDojwyt/Iq4SGWDxuGYsQkOQu0Nz
qBIWM1Xr7wqQ8DdCcvMt6yjTo3xTNLuefrS3yvEoj6Ymxa1vhY/PiQBGBBgRAgAG
BQJARFXPAAoJEBvatewC4Ge0VvEAn3sOBgeJgS2p/xYbNQi+8e2CDlXOAJ9NMUB/
I/ldHTLb8Je0iOBoDIOtRw==
=1F1d
-----END PGP PUBLIC KEY BLOCK-----
Regards!
 
Old 07-27-2005, 07:19 PM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,632
Blog Entries: 4

Rep: Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931
Well, there's a lot of material on public-key encryption out there already, even on GnuPG's own site. But the basic principle is that there are always two keys, one private and one public. A message that is encrypted with one can only be decrypted with the other and vice-versa. (This so-called asymmetric encryption is distinct from conventional, symmetric encryption in which a single key is used for both purposes.)

So, with the public-key you sent, I could send you a message that only you could decrypt. Even I couldn't decrypt it. I could print a copy of the message on the front page of the New York Times and be confident that only you (and, well, maybe the CIA...) could read it.

If I received a message that I was then able to decrypt using your public key, I'd have very good reason to believe that only you could have sent it, and that no one could have tampered with it in the meantime. That is, as long as I'm certain that only you possess a copy of your private key. Why? Because only a holder of your private key could have created a message that I could successfully decrypt using your public key. Given that I did decrypt it, either you or someone who stole your private key must have written it.

Your public key is safely-public because I can't determine what your private-key is. I can't determine your private-key from your public one.

A "digital certificate" is like a digital identity-badge. It's built using public key techniques. It serves both as evidence of your identity, for traffic that comes from you, and as the source of a public-key that can be used to talk to "you and only you." I can't forge a copy of your certificate.

"Digital signatures" and "certifying authorities" (which can be "you...") are a way to prevent me from creating a certificate that has your name-and-address on it and passing it off to some unsuspecting stranger as "coming from you." It prevents me from impersonating you, and positioning myself as a "man in the middle," by adding an un-forgeable "seal of approval" to a bona fide certificate. I can use your name but I can't add your seal of approval, and I can't use my certificate or pass it off as yours if the server that I'm sending it to requires that your seal-of-approval be present.

That's the Reader's Digest version but, "hope this helps!"

Last edited by sundialsvcs; 07-27-2005 at 07:25 PM.
 
Old 07-27-2005, 08:40 PM   #3
maginotjr
Member
 
Registered: Aug 2004
Location: BR - Floripa
Distribution: Ubuntu 9.10 - 2.6.x.x
Posts: 661

Original Poster
Rep: Reputation: 35
Now I see ...

So now let talk with example, I have created this two keys with gpg. So to me send you a secure email you first have to give me a public key and them I will encrypt my message using your public key and you will decrypt it with your private key that only you have?

So to I send you a secure message first you have to give me your public key?
And what happens when you public key expire, I will not be abble to decrypt my file neve more?
And a last question, so this isnt the best way to encrypt files in my disk because I wont need a public key since the intention its protect the files from everyone else less myself? Now this come with this question, when I encrypt a file using GPG it gives me a to option, ASCII container or binary method, in ASCII I can give a CAT in the file and it returns a signature likely this one above, this is my public key?

thanks for you pascience...
 
Old 07-28-2005, 05:00 AM   #4
piete
Member
 
Registered: Apr 2005
Location: Havant, Hampshire, UK
Distribution: Slamd64, Slackware, PS2Linux
Posts: 465

Rep: Reputation: 44
sundialsvcs gave a very good description, but I think was on a different wavelength. I know a little about RSA encryption and digital certification is an extention of this. If you're really interested, I suggest rummaging around a university websites for course notes on "Computer Security and Cryptography" - I did a whole module on it fairly recently (I've graduated now \o/ ) and it was quite well explained. I suspect I can fish out some of my lecture notes if you wanted to have a read through, although it's skimmed through pretty fast.

Because it's so fundamental, I want to make clear now that both keys (public and private) are one-way. You cannot use the same key in a pair to decrypt a message that has been encrypted by that same key. This is why giving out a public key is so secure, it can't be used to decrypt a message encrypted with itself.

I don't want to go into detail about the maths behind it all (it gives me a headache), but for simplicity, I will be "combining" things like this: XY = Z. To reiterate: it is not a mathematical computation, it merely says: "do somethingt to X based on Y to obtain an output of Z".

To show the trap-door nature of the public/private key pair:

Public key = Kpublic
Private key = Kprivate
Message = M
Encrypted message = Mencrypt

Two valid examples:
1. Kpublic M = Mencrypt ---> Kprivate Mencrypt = M
2. Kprivate M = Mencrypt ---> Kpublic Mencrypt = M

NOT VALID!:
Kpublic M = Mencrypt --->Kpublic Mencrypt = M <--- you cannot do this if Kpublic was used to encrypt M!


So, with some specific examples, first of all let's get our people sorted out:

User A (maginotjr) has 2 keys: Apublic and Aprivate (public and private keys, respectively)
User B (sundialsvcs) has 2 keys: Bpublic and Bprivate (public and private keys, respectively)

maginotjr (user A) wants to send a secret message to sundialsvcs (user B). Let us assume they do not know each other; so the first step is to exchange public keys.

Public keys are so-called because they can be left in the public domain without fear of people cracking your messages.

Now that user A has given user B his public key (and vice versa, for simplicity), maginotjr (user A) can send sundialsvcs (user B) an encrypted message.

So User A takes our message M, and encrypts it using B's public key: Bpublic M = Mencrypted

Mencrypted is then sent in plain text to user B.

Since user B has the private key, he can decrypt Mencrypted like this: Mencrypted Bprivate = M

Sundialsvcs reads the message and is overjoyed that maginotjr can make it to his party =D

But wait! It could be a trap! Sundialsvcs doesn't know who that message is from - only that it has maginotjr's name at the end of it. It could be from anybody, since sundialsvcs has published his public key (Bpublic) on his website, so people can contact him securely.

So how can you be sure who a message is from *and* have it sent securely?

You sign the message using a digital signature!

So, User A writes a message M and takes a digest of it. A message digest is basically a sophisticated hash function.

Now the digest (Mdigest) is encrypted using User A's PRIVATE key to generate a message signature:
Aprivate Mdigest-sent = Asignature

The signature can now be sent along with the original message to prove who it came from. How? Well, the receiver (User B) gets an email that has 2 parts: the message and the signature.

He decodes the signature like this: Apublic Asignature = Mdigest-sent
And also recreates the message digest himself: Mdigest-check
He then compares the two digests. If they differ, the message has been tampered with and cannot be trusted. Sundialsvcs now knows that maginotjr must have sent that message, because only maginotjr's public key would be able to decrypt a message encrpyted by maginotjr's private key.

What if you don't want people reading the message? Well, then you wrap the whole thing up in the sender's public key!

So the steps are now as follows:

1. User A writes message M, creates message digest Mdigest-sent
2. User A "signs" the message by encrypting Mdigest-sent: Aprivate Mdigest-sent = Asignature
3. User A puts the message M next to the signature Asignature and encrypts the WHOLE lot with User B's public key: (M + Asignature) Bpublic = Mencrypted

4. User A sends Mencrypted to User B.

5. User B first decrypts the message: Mencrypted Bprivate = (M + Asignature)
6. User B then reads the signature with who he suspects sent the message (User A in this case): Asignature Apublic = Mdigest-sent
7. User B recreates the message digest from message M: Mdigest-check
8. User B checks the two digests for discrepancies: Mdigest-check = Mdigest-sent
9. If the two digests are identical, then the message hasn't been tampered with and is definitly from maginotjr (User A)!

10. maginotjr enjoys sundialsvcs's party =)

~~~~~~~~~~~~~~~~~~~

To answer maginotjr's questions directly:

Quote:
So to me send you a secure email you first have to give me a public key and them I will encrypt my message using your public key and you will decrypt it with your private key that only you have?
Yes!

Quote:
And what happens when you public key expire, I will not be abble to decrypt my file neve more?
If you get a message that you can read with his expired public key, it is not from him.

Quote:
so this isnt the best way to encrypt files in my disk
The public key system is good for (relatively) secure communication, but it is not what you want to encrypt your disk, I think.

~~~~~~~~~~~~~~~~~~~
I hope that's clearly shown how public/private key encryption works, but I strongly advise reading up on it some more if you're looking for more detail! Many thanks to sundialsvcs for throwing a party for us all!

- Piete.

~~~~~~~~~~~~~~~~~~~

Disclaimer: If I've got something wrong, please please please correct me - I've done most of this from memory and my exams were a while ago!
 
Old 07-28-2005, 10:42 AM   #5
maginotjr
Member
 
Registered: Aug 2004
Location: BR - Floripa
Distribution: Ubuntu 9.10 - 2.6.x.x
Posts: 661

Original Poster
Rep: Reputation: 35
ummmm

very good, very good, but at first look it can be something messy... but Im really interested, not that I have such importante email to be sent to my friends (I dont know anyone who can play this with me lol) but I want to understand and know how to make it works since it is such a important thing and this talks about privacy and stuff... The theory is very simple to understand, but my problem is when I go to my thunderbird with gpg exetension and have a bounch of option and names and codes and them I get a little lost...

I may search for this myself, but trusting on your experience can you give me any (very) good link (or links) that can make my understanding and pratices lot easy and functional ?

I have read something already in Computer Networks from Tanenbaum, but its only the theory and how things works, now Im want to see more about the real world and making things working...

thanks for you time to answer my question
 
Old 07-28-2005, 11:13 AM   #6
maginotjr
Member
 
Registered: Aug 2004
Location: BR - Floripa
Distribution: Ubuntu 9.10 - 2.6.x.x
Posts: 661

Original Poster
Rep: Reputation: 35
for e.g, how I can pass to you my public key so you can use it?

so many questions in my head right now lol
 
Old 07-28-2005, 04:05 PM   #7
Matir
LQ Guru
 
Registered: Nov 2004
Location: San Jose, CA
Distribution: Debian, Arch
Posts: 8,507

Rep: Reputation: 128Reputation: 128
Quote:
Originally posted by maginotjr
for e.g, how I can pass to you my public key so you can use it?

so many questions in my head right now lol
You could email the ascii-armored version of your key to them. Or... give it to them on a cd/disk/thumbdrive. Or be very secure (and obnoxious) and hand them a printout. (The ascii version of my public key has 1921 characters in it)
 
Old 07-28-2005, 05:00 PM   #8
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,632
Blog Entries: 4

Rep: Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931
Usually, people who wish to receive secure messages will post their public keys onto a "key server." They retain the corresponding private-keys and keep them secret. They should change the keys periodically, giving each public key that they release a "drop-dead date."

So let us be introduced once again to our friends, "Alice and Bob ." And of course to "Eve," ... the eve-il eve-sdropper.

Alice (of course...) wants to send a message to Bob. She obtains Bob's public key from a key server, encrypts the message with it and sends it. Only Bob can decrypt it, using the private key that only he knows. Eve intercepts a copy of the message, but she can't read it and she can't alter the ciphertext; doing so would render the message un-decipherable.
Bob decrypts the message successfully, but ... did the message that seems to be so friendly, "Hi, Bob!" ... actually come from Alice?

Bob can be sure that the message did come from Alice by checking the digital signature that she thoughtfully attached. This signature was prepared thusly:
  • Alice's e-mail program calculates a message digest for the message, using an algorithm like MD5. This is a short block of data that is generated from the message and that is extremely sensitive to any changes in the message text (so that bad ol' Eve can't tamper with it).
  • She encrypts the message-digest using her private key and attaches it to the message.
Bob decrypts the signature and finds that he can do so. (So, the signature must have come from Alice.) He generates the MD5 hash of the message, compares it to the decrypted digest, and finds that it is the same. (So, the message was not altered.)

E-mail programs can usually accept an encrypted message, automatically decrypt it, verify it, and confirm to you that the message is authentic ... all in one easy step.
 
Old 07-28-2005, 05:32 PM   #9
maginotjr
Member
 
Registered: Aug 2004
Location: BR - Floripa
Distribution: Ubuntu 9.10 - 2.6.x.x
Posts: 661

Original Poster
Rep: Reputation: 35
okay, the things is getting clear and clear ....

now lets continue my series of question lol

So, I take my ascii public-key and give it to you. Ok. When you receive it what you will do with it??? And how do I put my public key in a server?? How do you search for it?

thanks again!
 
Old 07-28-2005, 09:34 PM   #10
Matir
LQ Guru
 
Registered: Nov 2004
Location: San Jose, CA
Distribution: Debian, Arch
Posts: 8,507

Rep: Reputation: 128Reputation: 128
Note: if you do change your keys periodically, ALWAYS sign your new key with your old with "Ultimate" trust. This way, people know it's really your new key. And don't do it TOO often.
 
Old 07-29-2005, 02:31 AM   #11
BroX
Member
 
Registered: Oct 2003
Location: Sweden
Distribution: Slackware64-current, SlackwareARM-15.0
Posts: 833

Rep: Reputation: 90
Quote:
Originally posted by maginotjr
And how do I put my public key in a server?? How do you search for it?
There are several key servers, which mirror each other so you only have to register your public key to one of them. This list I got through Enigmail that I use within Thunderbird:

random.sks.keyserver.penguin.de
pgp.dtype.org
keyserver.kjsl.com
ldap://certserver.pgp.comminsky.surfnet.nl
pgp.mit.edu
random.sks.keyserver.penguin.de
pgp.dtype.org
keyserver.kjsl.com

Cheers, Leon.
 
Old 07-29-2005, 04:34 AM   #12
maginotjr
Member
 
Registered: Aug 2004
Location: BR - Floripa
Distribution: Ubuntu 9.10 - 2.6.x.x
Posts: 661

Original Poster
Rep: Reputation: 35
okay, everything is making sense now...

I created a Key. Created a .asc file with my public-key so I can give to anyone who I need to make secure contact. Have sucessfuly exported and imported keys, Enigmail is compreensive now.

Two more question:
1. Why when I exported my Key is made 2 containers in the asc file, one with the Public-key and other with the Private-Key?? Isnt the Public-key the only needed?
2. I can encrypt file with two option, ascii-armored and binary. Whats the diference? I supose that ascii-armored are for text messages that I can use -d option to read it direct from the console and binary for more security?

I want to make a test, can anyone send me an encrypted email so I can test it here? This is my public key:
Code:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.1 (GNU/Linux)

mQGiBELIz1gRBACyDxjthlK8TBze5bTUmlxfQWUrjcn3UbebYbkJ6VE5Wb+WFuH5
DJqkMMj5xTlbXkWa3f91gRoFwsotGJSEjXiobKJR/bilZ1enJQLDwmgXIzuRxt08
FlGX03UjIoSmUqRcEeQf14/ZhGkVvxFK46jgUA53H0lTGlNpC8x43qAI0wCgtwvL
IJce3KvIZl7EPHzAbuNZB/kEAI6vOdto2b6MASJljlconunMkHUHcn8c5C/CZT6Y
rqSfvkyDfpH7kVJoBFgcHopY91b2SDQVjkZyFuzXK99muROm1l1sBEBdcKOSvI+6
IEVlF9h05KxI9oY0W6bN5i3X3nFVFY1oRQsbAfmZJTj9lMv+N14G7sATd9KVYacr
wgXYBACc6eELjqf4oyWv5LKEcIoo41u19QKG3UJgkPH+OOnWwKENPUTQMmuLvHIN
V5Y9pMeGadKvHJMkJBdvZ/wbeGeqGj284N04d1fXsSghPK9r5JuoixXqmo9dRnUf
Yiy0Uz1K2CObDDaMTrpmfgzf4nHK/+G8CwgcM4ygh3GC++4GNrQnZGVhbGVyIChh
dXRoZW50aWMpIDxjMmQuZ2Vla0BnbWFpbC5jb20+iF4EExECAB4FAkLIz1gCGwMG
CwkIBwMCAxUCAwMWAgECHgECF4AACgkQOxGF8MvSZl/f4QCggGCLHrS6ZGQdgYlf
Cz8aBDyFCBoAn11mV9bJijYnxe9u/4L7TvrOQKCjuQQNBELIz5gQEADCSrf5Chzc
+x/xnqjPZGJIhrBli4y15sP/yjsrsHsdxDupVIq+U+4CFAFpehueYzigLLYewacN
4LL5XzE4qeyybmJZL8toHkKzyI234/8PVsSu3Vd15g9qsF3KlLdv9vb+DTJEpWgj
WEhx6XLgSEqu//YEMfDpU5XMWYx3Fc91HlkMLzx0b5Eo7pv7cEOM6lBhvmh+KjhC
5Raz5hCRX0tGe6H70Ils5Z2B6ffz8/eb7Pthhjh5X6dOiaJgQnGomLD8Ic0Kvmak
FOOu5b1IW9tSeOITQx0IuQBq7HR4DfOzoxIp7qu9WByoNlrptxEcUAmFmtNDA8zn
GGWCqcrzfW2PRXYBZS71yz61uXYopGEPDWqylsRqgqfXkdco5vSiWAHVcuSARcIq
k4tfHo+yQtP7nhK1m6w20OFEhduqK9Ni2VnWV69M/i385KAhdNLVddIqDfpK3/sD
FSgLbvkVLwIRgM4u5F4GpbDHT7EmeZSO8UFbtue3J0m6NIhmQUDLnT+EyUxto5OC
OI0zjW/WivodTw2cSHDB5VBL73p8kZoYUFWcHR085Zcagia+JYF9JiXXOMZC8Yw6
2nCqDiMjuyCIPRm/Q5QqVuRwQHmz58gE508hDOYCNDk43adGNtpLONSK+ODl32mj
lltCjB9YWr7NpUZzlwHka8Bx3MJYCz3yWwADBQ//aqkBgPXazIsf708Vs0d/e4Eb
UFvoCxTyq/LMseBnIEh0YgVapZO7YmckZGW9/j+kqRUg/9xwynLQcXRWNm4dL3U4
ROqCqvejlclggUHUT3ASVQvTkMmwQPnsXhV106ac6vuOgh4z0L+9lmHyhoqqhi60
pUyfrL5+7Yd0OWy3GXNTj5H84nPEj8v1+cKLqZYvpB2NJWwHCr7oDZsxsqInjzA1
AjM69kYAIE5yFlViZQ55F4VNoFLkgTXZKjTeYAHEbhlPrePxH4kh6rAWx7KnpEAS
7l6/Arj/GuGnKhsgLqSADN+ZLmIo5jGiuu7CpPrRq+4oApJTVbnqB7qE3i/AOHgv
vbiBRMI1WAg36W0abrp5ALrXnMbTiKmtP85kGIt8I5W5LYurAT2aMeGAot9v6zZ9
stu8WUB56w5T4UJpFh1ZeoECwamqQuyD8cv/bDlGprE1rK0E3ylRcadmyE394NO6
RxqzhLrPhH0NitrbgqYl//DD0izCVNZ9R2S/RkPwg92+hFC73yCvqCuTRv/tYJIi
7j3Lo7YDKfzZNEYYeWdFasti35B3U224nDMUWJcEJk3VpTVuv0Vf8xeJwBqz3hPO
rUZYvMnQtXXefaZv+zDYSaAyUUn3g3Teu68ujrqSEJDqRayCJFGvReWU5ShaoKCE
ZV6UdMNw2C1xb1ahJ6GISQQYEQIACQUCQsjPmAIbDAAKCRA7EYXwy9JmX/SXAJ9i
ZXJZUtr2czYF+zYGMAQcDudEIQCfdyi2N5923yn9lshSZW54X0U6kS4=
=98jx
-----END PGP PUBLIC KEY BLOCK-----
I think you can get the email direct from the public-key... Like im testing I want to know if its okay, if not the email is: c2d.geek@gmail.com
thanks!

Regards!

Last edited by maginotjr; 07-29-2005 at 04:38 AM.
 
Old 07-29-2005, 10:01 AM   #13
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,632
Blog Entries: 4

Rep: Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931
As far as I know, 'ASCII armored' files contain only characters that are guaranteed to be transmittable in the body of an e-mail. After being generated as usual, the binary data is expanded using a well known translation formula that uses only printable, non-HTML characters. A similar technique (MIME encoding) is used for many types of e-mail.
 
Old 07-29-2005, 10:28 AM   #14
maginotjr
Member
 
Registered: Aug 2004
Location: BR - Floripa
Distribution: Ubuntu 9.10 - 2.6.x.x
Posts: 661

Original Poster
Rep: Reputation: 35
and whats the diference and pros of them??

Wanna thanks for those who send me an email to help me with my understanding about how pgp and encryptation works... if you need is just ask
 
Old 07-29-2005, 10:52 AM   #15
Matir
LQ Guru
 
Registered: Nov 2004
Location: San Jose, CA
Distribution: Debian, Arch
Posts: 8,507

Rep: Reputation: 128Reputation: 128
Just FYI: ASCII-armored is base64 encoding. (64 possible values: 26 uppercase letters, 26 lower case letters, 10 digits, and '+' and '/')
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LPI Certification/Linux+ Certification rhodan Linux - Newbie 10 12-29-2006 10:35 AM
Mounting works, playing music works, reading tags doesn't Celettu Linux - Newbie 7 08-23-2006 12:27 PM
Enable digital output for digital speakers? alphster Linux - Hardware 5 12-26-2004 10:56 PM
LPI Certification/Linux+ Certification rhodan Linux - General 1 10-08-2004 07:08 PM
Certification fdr Fedora 2 03-16-2004 04:39 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:57 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration