In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces the example analysis of GPG encryption in Linux, which has a certain reference value, and interested friends can refer to it. I hope you will gain a lot after reading this article.
GPG can be used to sign and encrypt data. It is convenient for the sender and receiver to encrypt the data and confirm the identity of the other party. GPG uses symmetric encryption to encrypt large chunks of content, while asymmetric encryption uses asymmetric encryption to exchange keys for symmetric encryption.
Under Ubuntu, you can encrypt and decrypt files with the GPG command, and GPG is pre-installed for almost every distribution.
Gpg-c file # encrypts a file and generates a file.gpggpg file.gpg # decryption file.gpg to restore to a file file
Common basic commands
Gpg-- gen-key # generate key pair gpg-- list-keys # View existing key gpg-- delete-secret-keys # Delete private key gpg-- delete-key # Delete public key gpg-- armor-- output public.key-- export # Export private key gpg-- armor-- output private.key-- export-secret-keys # Export public key gpg-- keyserver hkp://keyserver.ubuntu.com:11371-- send-keys # upload the public key to the server
When generating the secret key, it gets stuck after the following prompt appears.
We need to generate a lot of random bytes. It is a good idea to performsome other action (type on the keyboard, move the mouse, utilize thedisks) during the prime generation; this gives the random numbergenerator a better chance to gain enough entropy.
Manually install the following software to solve the problem!
Sudo apt install rng-tools
Here's how I generated the key pair locally and sent the public key to the server.
Public key servers: http://keys.gnupg.net/, http://keyserver.ubuntu.com:11371/
Thank you for reading this article carefully. I hope the article "sample Analysis of GPG encryption in Linux" shared by the editor will be helpful to you. At the same time, I also hope you will support us and pay attention to the industry information channel. More related knowledge is waiting for you to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.