Tag: public-key-encryption

112 How can I use encryption with Gmail? 2012-09-27T11:57:28.427

49 Can you extend the expiration date of an already expired GPG key? 2014-09-18T10:28:15.843

48 Does the right half of the rsa public key matter? 2012-12-09T08:48:35.453

34 How does SSH encryption work? 2012-01-29T20:37:10.590

22 Why does GPG/PGP by default use different keys for signing/encryption? 2013-08-15T16:48:00.713

22 Human-readable dump of gpg public key 2014-01-04T14:16:13.757

19 I got "BEGIN PGP PUBLIC KEY BLOCK" attached to an email and I don't know what it is 2018-10-30T16:04:53.423

14 Can I change the filename of my ssh public/private key pair? 2013-04-20T16:56:14.420

13 How, if at all, do SSH keys differ from asymmetric keys used for other purposes? 2011-04-22T04:13:20.797

12 How to generate a public/private key (UNIX) 2010-11-17T16:31:46.163

11 How are public keys "sent" to servers, and how are private keys "used" for SSH? 2015-08-19T15:28:01.047

9 Isn't it dangerous to use SSH keys to login to an unknown/compromised server? 2012-12-20T15:49:45.140

8 how to verify the trust path to a gpg key? 2012-10-28T16:39:48.547

8 How can I use GnuPG with ECDSA keys? 2013-07-23T09:50:44.847

7 How to ASCII-armor my public key without installing GPG? 2014-06-06T13:34:24.170

5 How can I get a new / non-technical user to verify my GnuPG / PGP signed email? 2010-12-12T09:26:36.173

5 gpg: import failure key xxxxxxxx: no valid user IDs 2012-11-13T05:28:02.167

5 Finding sshd log file 2013-12-10T16:32:18.803

5 Is uploading your openssh public key to ~/.ssh/ for a given user safe? 2014-08-01T19:02:50.497

5 How does public/private key cryptography work, who generates the key pair? 2016-05-19T22:57:00.837

4 sftp and public keys 2011-07-19T11:09:30.827

4 When I encrypt a message with my public key, can I read it with the same public key? 2011-07-19T17:17:52.857

4 How to setup ssh, key-based ("password-less") logins to a Linux/MacOSX sshd server via Windows, Linux, or MacOSX clients? 2011-12-11T22:16:38.587

4 Setting up sshd_config in cygwin for AES encrypted file transfer 2013-04-23T19:30:32.560

3 How to decrypt a message sent via Pidgin-Encryption? 2013-12-29T05:07:10.590

3 Is there a tool like dm-crypt/luks using RSA encryption? 2014-07-11T11:59:38.413

3 Should my OpenPGP key used for storing documents in the cloud expire? 2015-06-14T23:53:58.700

3 Outlook missing "Publish to GAL" 2015-10-14T23:18:10.540

3 Why does duplicity require the GnuPG passphrase when rotating backups? 2015-11-06T22:55:23.373

3 Why does PGP encrypt differently when piping into a file instead of printing the result? 2015-12-03T21:22:13.690

3 When adding a gpg key with homedir parameter error 2016-06-10T06:10:01.257

3 When is asymmetric and symmetric encryption used in SSH? 2018-11-01T17:21:11.617

3 How to check if a GPG encrypted file is encrypted using a specific public key? 2019-02-26T10:32:22.807

2 Encrypt tar file asymmetrically 2011-02-22T15:10:13.327

2 How does gpg handle multiple keys in a keypair? 2011-09-14T21:06:22.200

2 Does Key based authentication replace or rather supplement password authentication? 2011-09-29T21:50:07.803

2 How can I allow a user to connect to my OpenVPN by knowing their public key? 2012-12-18T02:43:05.220

2 Why am I prompted for a password when using SSH to connect to another server? 2013-05-20T23:44:13.743

2 Signature Verification using OpenSSL 2013-07-30T20:32:00.920

2 SSH Using Wrong ID 2013-08-27T16:33:36.407

2 SSH keys cached remotely? 2013-11-07T10:44:01.673

2 Duplicati uses symmetric encryption despite giving the recipient ID_key 2016-03-11T12:41:47.250

2 Cannot export secret key without providing passphrase 2016-09-17T22:02:33.633

2 `gpg --edit-key <user>` not listing public key 2017-07-15T08:20:24.407

2 setting up key based authentication for windows 10 ssh server and client 2018-06-26T16:58:31.930

1 Creating encrypted database for work 2011-02-10T13:20:41.637

1 How to embed an ASCII logo into an ASCII-armored RSA key? 2012-10-08T11:03:00.770

1 SSH rsa key works with external IP not internal IP 2012-12-14T20:33:35.247

1 How do you create an AES XTS key? 2014-03-13T21:45:44.883

1 Configuring Public Key Authentication with SSHD under Cygwin 2014-03-26T10:37:00.150

1 OpenSSH client refuses to use a new key file 2014-04-02T07:36:10.997

1 What is the role of cakey.pem and cacert.pem in addition to .key and .crt based encryption 2014-04-26T09:21:15.580

1 why does public key used to authenticate ssh seem to expire after a while? 2014-05-20T21:54:53.467

1 Errors generating gpg keypair 2014-06-01T17:37:13.833

1 Is there a way to revoke a GPG encryption key? 2014-06-16T18:07:23.813

1 Import public key (plain text) into Outlook 2010 2014-11-12T10:32:22.393

1 How to get GPG working with Outlook 2013? 2014-11-21T19:48:41.643

1 GPG 2 decrypt from STDIN via pasting inconsistency 2015-03-04T05:47:38.103

1 How to recover files from infected. Vvv extention 2015-12-10T13:39:35.087

1 GPG2 Encryption - No public key error 2016-05-20T00:18:11.903

1 Do I need a PGP key? 2017-12-18T22:10:39.433

1 Windows OpenSSH Public key issue 2018-04-24T20:21:27.567

1 How to verify sks-keyservers HKPS certificate? 2018-10-01T06:50:35.197

1 Should 'username@hostname' in a public key be distributed together? 2019-06-03T19:18:59.987

1 Extend the expiration date of a GPG key non-interactively 2019-09-04T01:25:25.120

1 What's the fundamental principle regarding who should hold which key (public vs. private)? 2019-12-05T18:33:25.033

1 Why does an EFS-encrypted file get decrypted when it gets uploaded to the Internet? 2020-01-04T14:17:49.060

0 setup ssh private/public keys 2012-02-27T14:21:22.263

0 Is there a user friendly desktop software that encrypts given text using PGP or GPG? 2012-05-22T19:37:13.433

0 Using Windows 7, is there any way to create a self-signed public/private key pair for email? 2012-06-30T00:44:37.030

0 GPG4WIN Keys and Transferring them 2013-03-11T02:09:44.890

0 How to show (for copy&paste) a secret GPG/PGP key without creating a file 2013-08-13T13:16:17.057

0 Why would one want to tag the computer where a key pair was made in a public key? 2014-01-17T19:24:22.893

0 Can a client server host multiple private ssh key for same profile? 2014-08-14T04:21:24.317

0 After Updating to SHA2, private and public doesn't match 2014-12-10T07:03:17.683

0 How to sniff passwords remembered by applications? 2014-12-10T13:19:58.610

0 openssl smime message signing: why do I need a -certfile key? 2015-08-27T11:03:54.100

0 gpg does not ask for passphrase on one encrypted file 2016-05-14T17:14:10.660

0 Knowing when a key becomes compromised 2016-07-23T10:00:01.393

0 What's the simplest way to perform public key encryption? 2017-03-24T19:19:43.223

0 Can't export or list keys 2017-06-02T11:22:18.107

0 GnuPG outputting rubbish when trying to use the encrypt option 2017-07-20T08:39:55.580

0 CertUtil | How CertUtil -verifykeys works internally? 2018-04-16T03:42:40.293

0 limit sftp access to specific folders when using a public/private key with openssh 2018-12-21T21:15:33.157

0 Is there a maximum number of subkeys in GnuPG? 2019-02-27T04:50:21.073

0 Can OpenSSH on Windows Server 2019 employ client certificates created via PowerShell as opposed to ssh-keygen? 2019-03-19T18:12:42.150

0 How to create a portable gpgme directory for C/C++ projects 2019-04-05T16:26:49.313

0 Unable to load Key pair from p12 certificate - OPENSSL error 2019-05-30T18:57:05.067

0 I want to port forward my ssh connection to my docker container, where I run gitlab 2019-11-27T09:10:34.970

0 Is the role of public key/private key determined arbitrarily or mathematically? 2019-12-06T00:20:43.480

0 Will the contents of an encrypted file from a local disk be visible to others when uploaded to the Internet? 2020-01-04T12:30:22.863

0 How to encrypt a message by using a .pub file? 2020-02-24T13:39:59.223

-2 How do I restore a deleted file encryption key on Windows 10? 2017-10-11T16:30:42.190