Tech Tip: Encrypt Files with GPG
Encrypting files from the command line is simple with gpg. You can use it to encrypt and decrypt files with a password.
The command gpg is part of GnuPG. GnuPG stands for GNU Privacy Guard and is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It also includes an advanced key management facility. GnuPG works on Linux and UNIX like operating systems as well as for Windows and Mac OS X.
To encrypt a single file, use the -c command line option with gpg. For example, to encrypt the file myfinancial.info, use the command:
$ gpg -c myfinancial.info Enter passphrase: YOUR-PASSWORD Repeat passphrase: YOUR-PASSWORD
This will create the file myfinancial.info.gpg. Note that the original file is not deleted, so once you feel safe encrypting and decrypting files, you probably want to delete your unencrypted versions of the files. Also note that depending on your system's configuration, gpg may ask for passphrases in pop-up windows rather than at the command line.
The -c option tells gpg to encrypt with a symmetric cipher. Caution: don't forget your passphrase (password), there is no way to recover data with out the passphrase.
To decrypt the file, use the command:
$ gpg myfinancial.info.gpg gpg: CAST5 encrypted data Enter passphrase: YOUR-PASSWORD
If you want to write the output to a different file, use the -o command line option:
$ gpg –o myfin.info.txt myfinancial.info.gpg
If you'd rather have a "text" file, rather than a binary file, use the -a option to gpg:
$ gpg -c -a myfinancial.info Enter passphrase: YOUR-PASSWORD Repeat passphrase: YOUR-PASSWORD
This will create the file myfinancial.info.asc rather than myfinancial.info.gpg.
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
|Concerning Containers' Connections: on Docker Networking||Aug 26, 2015|
- Using tshark to Watch and Inspect Network Traffic
- September 2015 Issue of Linux Journal: HOW-TOs
- Concerning Containers' Connections: on Docker Networking
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Firefox Security Exploit Targets Linux Users and Web Developers
- A Project to Guarantee Better Security for Open-Source Projects
- Where's That Pesky Hidden Word?
- Build a “Virtual SuperComputer” with Process Virtualization
- My Network Go-Bag
- Doing Astronomy with Python