If you think that you are not sure which option to choose, just do not change anything, but leave the selection by default

In the Full name field, enter your name, and in the Email address field, type the email address. Although it is not necessary to indicate your real name, this can help correspondents identify this public key as belonging to you. The same applies to email addresses; In addition, his instruction will allow correspondents to use PGP plug-ins in mail clients that find a key on the binder with the email address of the recipient and automatically encrypt the email with this key.

In the Key size field, specify the size of the key to be created in bits. A larger key will require more time for generation and further encryption / decryption operations, while providing a greater degree of reliability. If the information you transmit is not of value comparable to the price of an extremely expensive cryptanalytical attack, there will be more than enough default 2048 bits.

Under Key Expiration, specify the expiration date for the key that you are creating. Select either the default Never, or specify a certain date with which the key pair can not be used for encryption and signing tasks (nevertheless, it can be used to decrypt and reconcile EDSs). Never is preferable. If, however, you plan to use this key only for a certain period (for example, during the term of the contract with the employer), indicate here the far boundary of this period.

In the key phrase selection window, enter the password in both fields that you want to protect your new private key in.

The key phrase (password) is the only and for this reason the most important mechanism for protecting the private key from unauthorized use. All the reliability of PGP rests on the quality of the key phrase chosen by you at this stage. As a precaution, the program hides the input characters. If you are uncomfortable with this and you are sure that there are no strangers in the room, remove the tick with Hide Typing.

For compatibility reasons, it is not recommended to use the Cyrillic alphabet and other non-Latin national letter symbols for the key phrase. If you think that their use is necessary, test the generated key on non-value information and make sure that you can freely decrypt it, before applying the key to the destination

If the key phrase entered in the previous step does not comply with the safety standards, PGP will issue a warning. Go back and fix the problem, because ignoring it will cause serious problems with the security of the key.

The movements of your mouse and keystrokes create a lot of random information (entropy), mandatory for the generation of keys. However, it happens that PGP does not have enough time to accumulate enough entropy before the generation of the key. In this case, the window for collecting random data PGP Random Data appears: just move the mouse and press any keys until the scale is full. If everything is fine, PGP will proceed to generate the key.

Depending on the power of the computer and the length of the generated key, this stage may take a different amount of time: from a few seconds to tens of minutes. Wait until the key generation items are ticked and the message Current Status: Done appears. After that, you can click OK and then Finish.

PGP will automatically place the public and private keys in the appropriate bundle files, and the key name will appear in the PGPkeys manager window.

12. Export your key to a text file (menu item Keys-> Export to PGP Keys)

Exchange your public keys. Set trust to the imported public key (The circle in the Validty field should turn green).


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: