E:\ >gpg --edit-key 6C14565D
gpg (GnuPG) 2.0.12; Copyright (C) 2009 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
pub 1024D/6C14565D created: 2009-10-19 expires: 2010-01-17 usage: SC
trust: full validity: unknown
sub 2048g/B05617AA created: 2009-10-19 expires: 2010-01-17 usage: E
[ unknown] (1). Internet Security and Privacy (Course key)
[ unknown] (2) Internet Security and Privacy
[ unknown] (3) Internet Security and Privacy
[ unknown] (4) Internet Security and Privacy
[ unknown] (5) Internet Security and Privacy
Then at the prompt use trust command and set the desired trust level.
Command> trust
Then it will ask the required trust level among the following options.
1 = I don't know or won't say 2 = I do NOT trust
3 = I trust marginally 4 = I trust fully
5 = I trust ultimately m = back to the main menu
Your decision? 4
·如何设置GPG密钥—— How to create keys with GPG
Key in GPG can be generated by using -gen-key command. It includes several steps which are explained in following example.
E:\Courses\2nd Quarter\Internet Security\Labs\1\2nd>gpg --gen-key
gpg (GnuPG) 2.0.12; Copyright (C) 2009 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
The first step is to decide the appropriate type of key. Option 2 creates a DSA key-pair which is the master key-pair used only for signing and an Elgamal subordinate key-pair for encryption.
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elgamal
(3) DSA (sign only)
(4) RSA (sign only)
Your selection? 2
Then the key length is required. A longer key reacts more secure against the brute-force attacks.
DSA keys may be between 1024 and 3072 bits long.
What keysize do you want? (2048) 1024
Requested keysize is 1024 bits
It then asks validity period of the key.
Please specify how long the key should be valid.
0 = key does not expire
= key expires in n days
w = key expires in n weeks
m = key expires in n months
y = key expires in n years
Key is valid for? (0) 4w
Key expires at 12/19/09 14:46:41 W. Europe Standard Time
Is this correct? (y/N) y
Now GPG asks the userid of our key-pair. It can allow those who get our public key to know who this key belongs to. We are also required to specify email address here. Finally, we must specify the passphrase to protect our secret key; GPG uses it to control the access to our secret key.
GnuPG needs to construct a user ID to identify your key.
You need a Passphrase to protect your secret key.
Now GPG is generating our key-pair, during this process it asks to produce more “seed” to make the key generated
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。