gpg --armor --output 4step8signed --encrypt --sign 4signstep8
You need a passphrase to unlock the secret key for
user: 'Khan Muhammad Tauseef (IK2206) >'
1024-bit DSA key, ID 96DD7072, created 2009-11-21
You did not specify a user ID. (you may use '-r')
Current recipients:
Enter the user ID. End with an empty line:
gpg: B05617AA: There is no assurance this key belongs to the named user
pub 2048g/B05617AA 2009-10-19 Internet Security and Privacy
Primary key fingerprint: 00E2 5F48 4127 488C 51EC 08DE B367 D505 6C14 565D
Subkey fingerprint: 332C 0FD9 146B 75A2 7D2D 06D9 D843 960F B056 17AA
It is NOT certain that the key belongs to the person named
in the user ID. If you *really* know what you are doing,
you may answer the next question with yes.
Use this key anyway? (y/N) y
Current recipients:
2048g/B05617AA 2009-10-19 'Internet Security and Privacy'
·签名信息举例—— Examples of signed messages
The email contains several sections that are separated by separators. We used -verify command to check the signatures.
E:\good signed>gpg --verify part3.asc
gpg: Signature made 11/21/09 15:59:46 W. Europe Standard Time using DSA key ID 6C14565D
gpg: Good signature from 'Internet Security and Privacy (Course key)'
gpg: aka 'Internet Security and Privacy'
gpg: aka 'Internet Security and Privacy >'
gpg: aka 'Internet Security and Privacy '
gpg: aka 'Internet Security and Privacy '
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 00E2 5F48 4127 488C 51EC 08DE B367 D505 6C14 565D
GPG tells about the signatures that this file has. It returns an indication of either a good signature or a bad signature. A good signature means that the signature of the file matches the signature that GPG expects, from the mentioned key on this file. Another possible output is a bad signature which means that the contents of the file were altered.
E:\Bad Signed>gpg --verify part4.asc
gpg: Signature made 11/21/09 15:59:46 W. Europe Standard Time using DSA key ID 6C14565D
gpg: BAD signature from 'Internet Security and Privacy (Course key)'
We can also use the -decrypt command for this purpose. This command not only provides the information os the signatures but also provides the decrypted contents of the file. As shown in the first line below.
E:\Bad Signed>gpg --decrypt part4.asc
eb8c990b7e894bcafa73b1b3a8302b865ed0fbbf
gpg: Signature made 11/21/09 15:59:46 W. Europe Standard Time using DSA key ID 6C14565D
gpg: BAD signature from 'Internet Security and Privacy (Course key)'
·如何用GPG验证加密电子邮件—— How to verify encrypted e-mails with GPG
The email message that we have received contains encrypted data so we need to first decrypt it by using the -decrypt option.
E:\step 9>gpg --armor --output test.asc --decrypt part6.txt
You need a pass
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。