Back pgp2.shtml Next
    • A Sample PGP Session.
      • Encrypting and Sending a message.
        1. Generate a public/private key pair for yourself.
          			
          C:\utils\PGP\doc>pgp -kg
          WARNING: Environmental variable TZ is not defined, so GMT timestamps
          may be wrong.  See the PGP User's Guide to properly define TZ
          in AUTOEXEC.BAT file.
          Pretty Good Privacy(tm) 2.6.2 - Public-key encryption for the masses.
          (c) 1990-1994 Philip Zimmermann, Phil's Pretty Good Software. 11 Oct 94
          Uses the RSAREF(tm) Toolkit, which is copyright RSA Data Security, Inc.
          Distributed by the Massachusetts Institute of Technology.
          Export of this software may be restricted by the U.S. government.
          Current time: 1997/06/04 18:17 GMT
          Pick your RSA key size:
              1)   512 bits- Low commercial grade, fast but less secure
              2)   768 bits- High commercial grade, medium speed, good security
              3)  1024 bits- "Military" grade, slow, highest security
          Choose 1, 2, or 3, or enter desired number of bits: 3
          Generating an RSA key with a 1024-bit modulus.
          
          You need a user ID for your public key.  The desired form for this
          user ID is your name, followed by your E-mail address enclosed in
          , if you have an E-mail address.
          For example:  John Q. Smith <12345.6789@compuserve.com>
          Enter a user ID for your public key:
          Freak 
          
          You need a pass phrase to protect your RSA secret key.
          Your pass phrase can be any sentence or phrase and may have many
          words, spaces, punctuation, or any other printable characters.
          
          Enter pass phrase:
          Enter same pass phrase again:
          Note that key generation is a lengthy process.
          
          We need to generate 680 random bits.  This is done by measuring the
          time intervals between your keystrokes.  Please enter some random text
          on your keyboard until you hear the beep:
          0 * -Enough, thank you.
          .............
          Key generation completed.
          
        2. Grean creates a message for Brandon.
            To: Brandon
            Subject: Tard!
            You're a tard!
            				
        3. Grean encrypts message with Brandon's public key.
          -----BEGIN PGP MESSAGE-----
          Version: 2.6.2
          
          hIwDYs91UIOIS/kBA/9Xt5HHu/6HPQWCLLoASB4fQXyXBbBY+20NjS3sKlEe3BRN
          nmFD33HH186O3UZlZQ8S6a90Rzn/CdNVZmLdyjtU1RpkmPAsVfMRBKSIca1hzHlI
          lEQTI1UIe2cMPdfW36H02Cu1hwkp4BQt/O2u8+PATRRGmKy8XkJSBDqvjtBGgaYA
          AAArZe9z66QkIqe/hqKk2Sqx2+Vn0n79RKC5mTI3cxUPXlwfofcFSiaOIY0sAA==
          =Kbt8
          -----END PGP MESSAGE-----
          				
        4. Grean sends the encrypted message to Brandon.

      • Decrypting and Receiving a message.
        1. Brandon receives a message from Grean.
        2. Brandon decrypts message with Brandon's private key.


Copyright 1997 by Slackers Union. Comments should go to any of the group members. Opinions reflected on this page are by no means opinions of UCSD. Go sue somebody else.

Last Modified: June 1st, 1997