Hi I need help with an assignment that involves GPG encryption, generating a gpg public and private key.
going to use GNU Privacy Guard (GPG) in Linux. For the setup, you’ll need to
create your own public/private keypair, decrypt a file encrypted symmetrically
with a passkey, and import my public key.
See attached word document for further assignment description, there is also a .gpg file attached for the assignment.
Unformatted Attachment Preview
You are going to use GNU Privacy Guard (GPG) in Linux. For the setup, you’ll need to create
your own public/private keypair, decrypt a file encrypted symmetrically with a passkey, and
import my public key.
There are further instructions inside the decrypted file. I want your response to the
instructions encrypted using my public key – I’m the only recipient which should be able to
decrypt – and signed with your private key.
MD5 Hash for verification: 0d8ebb0ee2bbb7738bee506d243f5004 cis4360.a5.gpg
Note to self: change the combination on my luggage
To decrypt: gpg –output cis4360.sp18.a5.zip –decrypt assignment.gpg
This will create a file – assignment.zip – containing a text document with instructions and my
public key; you should notice upon decrypting the file, that it was signed by me.
Very useful in addition to the man pages. This covers generation new keys, exporting and
importing, concepts, etc.
To recap all you need to do is:
Decrypt the Assignment 5 File, Create a GPG keypair, import my key, respond to what I ask,
encrypt and sign that answer, export your public key, put those two files in the assignment
box and you’re done.
Purchase answer to see full
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more