GNU Privacy Guard (GPG)Create a key pair with (RSA and 2,048-bit keys): > gpg --gen-key gpg (GnuPG) 1.4.23; Copyright (C) 2015 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. gpg: keyring `C:/Users/Administrator/AppData/Roaming/gnupg\secring.gpg' created gpg: keyring `C:/Users/Administrator/AppData/Roaming/gnupg\pubring.gpg' created Please select what kind of key you want: (1) RSA and RSA (default) (2) DSA and Elgamal (3) DSA (sign only) (4) RSA (sign only) Your selection? 1 RSA keys may be between 1024 and 4096 bits long. What keysize do you want? (2048) Requested keysize is 2048 bits Please specify how long the key should be valid. 0 = key does not expire Now export your public key using the form of: gpg --export -a "Your name" > mypub.key Now export your private key using the form of: gpg --export-secret-key -a "Your name" > mypriv.key How is the randomness generated? How is the randomness generated? Outline the contents of your key file: Now send your lab partner your public key in the contents of an email, and ask them to import it onto their key ring (if you are doing this on your own, create another set of keys to simulate another user, or use Bill’s public key – which is defined at http://asecuritysite.com/public.txt and send the email to him): gpg --import theirpublickey.key Now list your keys with: gpg --list-keys Which keys are stored on your key ring and what details do they have: Create a text file, and save it. Next encrypt the file with their public key: gpg -e -a -u "Your Name" -r "Your Lab Partner Name" hello.txt What does the –a option do: What does the –r option do: What does the –u option do: Which file does it produce and outline the format of its contents: Send your encrypted file in an email to your lab partner, and get one back from them. Now create a file (such as myfile.asc) and decrypt the email using the public key received from them with: gpg –d myfile.asc > myfile.txt |