Encryption and Signing with GPG. Using of Gpg4win package
Abstract
In a world where digital communications play a key role, encryption is an elementary security rule that prevents a huge number of problems. When we send an e-mail, it passes through dozens of intermediate nodes. And each of the nodes can have many vulnerabilities and security holes which can be used by anyone. For many years, up to the 70s of the last century, a single key was used for encryption and decryption. This single key could be a key phrase, a combination of the details of the encryption machine, etc., which should have been known, and to the one who encrypts the message, and the one who should read it. This is the so-called symmetric encryption. The main problem of this method is the exchange of keys. Public keys were developed to solve the problem of secret key exchange. GPG encryption method is an excellent tool for encrypting e-mail and digital materials. It uses a key pair to send messages. One key is open (public key) and can be transferred to anyone. The other key is secret (private key) and is stored only by the owner. The sender encrypts the message with the own secret key and the help of public key of the recipient and now the encrypted message can be decrypted only with using of the receiver's private key and with the public key of the sender. This method solves the secret key exchange problem inherent in symmetric ciphers. There is no need to agree on a key between the sender and the recipient. All that is required before the start of secret exchange is the exchange of public keys between sender and receiver. In addition, one public key can be used by all correspondents of the recipient.