Skip to content

Files

Latest commit

0289251 · Jan 9, 2014

History

History
55 lines (37 loc) · 1.59 KB

decrypt_verify.md

File metadata and controls

55 lines (37 loc) · 1.59 KB

Decrypt and verify a message from a correspondent

This guide assumes that you're familiar with the background and have generated some keys.

Ingredients

Method

  • Mount the USB memory sticks
  • Decrypt and verify the message

Mount the USB memory sticks

On the secure workstation, mount the keys and unsafe USB memory sticks.

Decrypt and verify the message

me@box:~$ export GNUPGHOME=/media/keys
me@box:~$ gpg --decrypt /media/unsafe/msg.asc

You need a passphrase to unlock the secret key for
user: "My Full Name <me@domain.example.com>"
4096-bit RSA key, ID 0xFDB32668D55D0A12, created 2013-12-14
         (subkey on main key ID 0xF1829BDBB6B64480)

gpg: encrypted with 4096-bit RSA key, ID 0xFDB32668D55D0A12, created 2013-12-14
gpg:  "My Full Name <me@domain.example.com>"
Greetings,
There are three of them and Alleline.
Sincerely,
Control.

gpg: Signature made Thu 9 Jan 2014 21:30:00 GMT
gpg:                using DSA key 0xC097AC75C097AC75
gpg: Good signature from "Your Contact <your-contact@example.com>" [full]
gpg:                 aka "Your Contact <your-contact@other.example.com>" [full]
me@box:~$