Advertisement
Guest User

Untitled

a guest
Feb 17th, 2013
190
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.88 KB | None | 0 0
  1. root@bt:~# gpg --gen-key
  2. gpg (GnuPG) 1.4.10; Copyright (C) 2008 Free Software Foundation, Inc.
  3. This is free software: you are free to change and redistribute it.
  4. There is NO WARRANTY, to the extent permitted by law.
  5.  
  6. gpg: directory `/root/.gnupg' created
  7. gpg: new configuration file `/root/.gnupg/gpg.conf' created
  8. gpg: WARNING: options in `/root/.gnupg/gpg.conf' are not yet active during this run
  9. gpg: keyring `/root/.gnupg/secring.gpg' created
  10. gpg: keyring `/root/.gnupg/pubring.gpg' created
  11. Please select what kind of key you want:
  12. (1) RSA and RSA (default)
  13. (2) DSA and Elgamal
  14. (3) DSA (sign only)
  15. (4) RSA (sign only)
  16. Your selection?
  17. RSA keys may be between 1024 and 4096 bits long.
  18. What keysize do you want? (2048)
  19. Requested keysize is 2048 bits
  20. Please specify how long the key should be valid.
  21. 0 = key does not expire
  22. <n> = key expires in n days
  23. <n>w = key expires in n weeks
  24. <n>m = key expires in n months
  25. <n>y = key expires in n years
  26. Key is valid for? (0)
  27. Key does not expire at all
  28. Is this correct? (y/N) y
  29.  
  30. You need a user ID to identify your key; the software constructs the user ID
  31. from the Real Name, Comment and Email Address in this form:
  32. "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
  33.  
  34. Real name: [redacted]
  35. Email address: [redacted]
  36. Comment: lab2 rsa public rsa private key pair
  37. You selected this USER-ID:
  38. "[redacted] (lab2 rsa public rsa private key pair) <[redacted]>"
  39.  
  40. Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
  41. You need a Passphrase to protect your secret key.
  42.  
  43. We need to generate a lot of random bytes. It is a good idea to perform
  44. some other action (type on the keyboard, move the mouse, utilize the
  45. disks) during the prime generation; this gives the random number
  46. generator a better chance to gain enough entropy.
  47. ......+++++
  48. ..+++++
  49. We need to generate a lot of random bytes. It is a good idea to perform
  50. some other action (type on the keyboard, move the mouse, utilize the
  51. disks) during the prime generation; this gives the random number
  52. generator a better chance to gain enough entropy.
  53. +++++
  54. +++++
  55. gpg: /root/.gnupg/trustdb.gpg: trustdb created
  56. gpg: key 587AC911 marked as ultimately trusted
  57. public and secret key created and signed.
  58.  
  59. gpg: checking the trustdb
  60. gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
  61. gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
  62. pub 2048R/587AC911 2013-02-17
  63. Key fingerprint = 7D69 E048 3644 8362 5D65 E13A 32C8 56D3 587A C911
  64. uid [redacted] (lab2 rsa public rsa private key pair) <[redacted]>
  65. sub 2048R/95C6DE52 2013-02-17
  66.  
  67. root@bt:~# gpg --export -a "[redacted]" > public.key
  68. root@bt:~# ls
  69. Desktop public.key
  70. root@bt:~# mkdir lab2
  71. root@bt:~# mv public.key lab2/
  72. root@bt:~# ls
  73. Desktop lab2
  74. root@bt:~# cd lab2/
  75. root@bt:~/lab2# ls
  76. public.key
  77. root@bt:~/lab2# cat public.key
  78. -----BEGIN PGP PUBLIC KEY BLOCK-----
  79. Version: GnuPG v1.4.10 (GNU/Linux)
  80.  
  81. mQENBFEg+8MBCAC09vBubpbAwNvevFzBD9keRqEqHtnze65G9hfbOXm0KpUsoaA2
  82. SZO7YyOTG19zCnLGQkAwJxKem+OFmFfzBbAlDnknsJ/dekAcAiRgc4NEMYVH1QB2
  83. 4K8VZ9sqT4jsPvxKNSW6IVFWDt088ZsdNs64FmBIqErhqJ8hT1nhvS/QsIJ3DdOc
  84. sKCpwg4/Xhblw8DBYwnw5QDufigA2pAiTrC8Ihh0nQWzvoFvgZNZauSNYD6dBNv2
  85. xB47w4cmRh4KVRjpnVDNs8byhtARRNKxwnfZdkcusTC8XWxCLa9ZToijRLYVEU2P
  86. iI1e28OcU/d5lbqUH+rxcXEIgWEvBIuuK52RABEBAAG0QkRhbiBTbWl0aCAobGFi
  87. MiByc2EgcHVibGljIHJzYSBwcml2YXRlIGtleSBwYWlyKSA8ZHRzNTAwNEBwc3Uu
  88. ZWR1PokBOAQTAQIAIgUCUSD7wwIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AA
  89. CgkQMshW01h6yRGsgAf/S3Dmz/DaRQLMu8ex19jj2cNih2lvYV67jCK89pVx5VfD
  90. iQvXDiatXpbG9kK3n5udkOSlRV0mKljAkcl0VdBzToBKBc5ghdRhNifQqXqEZ3du
  91. fdM/mvntv1qUqzF4Nbdhsz5EgWylf5RkrpHO/yJR3jkAiKH8RO/tybKnMAaNcBnw
  92. 3jNuPfwwbOgvMTRNp7qrYExrganmexvBo795sVguu9Jkpa8nVAtr1v7CD4wcLFkn
  93. QYB3uDREtcB5UoKZXts98wbGDm8Ne/rSc0EaVZ81L6O4ClNI0gavi/cOjTVzQDos
  94. OU8PU46g1/vsdfPS3lcmmQf+o8uWBZX+LLEekLGiPbkBDQRRIPvDAQgAz1FKKIsX
  95. DYB/rb2am7xL1aYKqURLTUCpOc7hMPZYLc6nWNwNujCGtE7yVGO89rdHKnoN0osV
  96. zlFeFd+ptRUnC0PgnkTx1987wZsFyAnlL7HwzG9BvyVtQXmC1bI2iqCOBIbVcg3u
  97. AXfji6H3YUqxXiTJYrRyOwZPjaivPH+uNlU7Fbs6ujCncdi5qIjvn9HkLlN+Y5fU
  98. mNQDERYGwy6xenNtvqswOjWevjEq7Rp/L5HVF726RdlWYX2OwhBb1qviY1Crm9hN
  99. Oc+gswmuCcvGzzdG6bXuNc3yrLwPl/9GYH+Uqt/3tIz+uTvk9IVncbpBnb0bCVMq
  100. wcJXDYeC1f+LvwARAQABiQEfBBgBAgAJBQJRIPvDAhsMAAoJEDLIVtNYeskRAVII
  101. AI/uwEwi8YCpplfbiqsas32cBHTSSHAj0B8E9ZMF37g8EpxeHdNGiiChxT8HfFUO
  102. T3CiQwvQvkOmHJ5D6wwWIu2wRkG8yp4vKJlqDa2qlZdl1sJ78yh/ohzx4QVshwIK
  103. 1ryLMxAl//X/kY9dQ3TKYWnq1lsuopH64nZTAOqus5Zc1C+eCtAPhCtq0iwjzl6T
  104. sZ5Fi8PIAEDKChXoSpoRTwqs5FnBa05nm55/358aBJ8cZDWshUauWHUDwwgRvALW
  105. Iz4ylGz/PofgE8DHzmmHwGDIwWrCP4zHzZAGnTT+DIJVCoFgNnmJneEmm6S9ywF4
  106. Pz9oSjvX1VBfZkPbwljv8ng=
  107. =DvRd
  108. -----END PGP PUBLIC KEY BLOCK-----
  109. root@bt:~/lab2# ls
  110. cmpsc443public.key public.key
  111. root@bt:~/lab2# gpg --import cmpsc443public.key
  112. gpg: key 8D32F9E8: public key "Yingjia li <yxl248@psu.edu>" imported
  113. gpg: Total number processed: 1
  114. gpg: imported: 1 (RSA: 1)
  115. root@bt:~/lab2# gpg --list-keys
  116. /root/.gnupg/pubring.gpg
  117. ------------------------
  118. pub 2048R/587AC911 2013-02-17
  119. uid [redacted] (lab2 rsa public rsa private key pair) <[redacted]>
  120. sub 2048R/95C6DE52 2013-02-17
  121.  
  122. pub 2048R/8D32F9E8 2013-02-12 [expires: 2017-02-12]
  123. uid Yingjia li <yxl248@psu.edu>
  124. sub 2048R/6719BB26 2013-02-12 [expires: 2017-02-12]
  125.  
  126. root@bt:~/lab2# openssl enc -aes-256-cbc -md sha1 -P -out aes.key
  127. enter aes-256-cbc encryption password:
  128. Verifying - enter aes-256-cbc encryption password:
  129. salt=3021541B784EBEF4
  130. key=794650D4ACA03A2D0014BFC44B33CDD73245AEE8B3FAF94EE6273F9DC6BAD678
  131. iv =ACD1ECF7F2626C47124D2C09DCF6F337
  132. root@bt:~/lab2# ls
  133. aes.key cmpsc443public.key public.key
  134. root@bt:~/lab2# cat aes.key
  135. root@bt:~/lab2# openssl enc -aes-256-cbc -md sha1 -P > aes.key
  136. enter aes-256-cbc encryption password:
  137. Verifying - enter aes-256-cbc encryption password:
  138. root@bt:~/lab2# cat aes.key
  139. salt=631300EEAC590887
  140. key=AC5902A9B2128F3F5159F5B1EB3B08D50099C15ED412B002E7F49A6CA5470714
  141. iv =9FD782FBAEA58F818AA74F9D8038571C
  142. root@bt:~/lab2# echo "[redacted]" > lab2.txt
  143. root@bt:~/lab2# uname -a >> lab2.txt
  144. root@bt:~/lab2# cat lab2.txt
  145. [redacted]
  146. Linux bt 3.2.6 #1 SMP Fri Feb 17 10:34:20 EST 2012 x86_64 GNU/Linux
  147. root@bt:~/lab2# ls
  148. aes.key cmpsc443public.key lab2.txt public.key
  149.  
  150. root@bt:~/lab2# openssl enc -kfile aes.key -base64 -in lab2.txt > lab2_encr.txt
  151. root@bt:~/lab2# ls
  152. aes.key cmpsc443public.key lab2_encr.txt lab2.txt public.key
  153. root@bt:~/lab2# cat lab2_encr.txt
  154. RGFuIFNtaXRoCkxpbnV4IGJ0IDMuMi42ICMxIFNNUCBGcmkgRmViIDE3IDEwOjM0
  155. OjIwIEVTVCAyMDEyIHg4Nl82NCBHTlUvTGludXgK
  156. root@bt:~/lab2# gpg --encrypt --recipient "Yingjia li" -a o aes.key.asc aes.key
  157. usage: gpg [options] --encrypt [filename]
  158. root@bt:~/lab2# gpg --encrypt --recipient "Yingjia li" -a -o aes.key.asc aes.key
  159. gpg: 6719BB26: There is no assurance this key belongs to the named user
  160.  
  161. pub 2048R/6719BB26 2013-02-12 Yingjia li <yxl248@psu.edu>
  162. Primary key fingerprint: 1B9E B980 ABE5 E8E6 C26C 9788 5F85 9687 8D32 F9E8
  163. Subkey fingerprint: C2FA DB41 0DB0 0E58 A489 9D5B 8107 429C 6719 BB26
  164.  
  165. It is NOT certain that the key belongs to the person named
  166. in the user ID. If you *really* know what you are doing,
  167. you may answer the next question with yes.
  168.  
  169. Use this key anyway? (y/N) y
  170. root@bt:~/lab2# ls
  171. aes.key aes.key.asc cmpsc443public.key lab2_encr.txt lab2.txt public.key
  172. root@bt:~/lab2# cat aes.key.asc
  173. -----BEGIN PGP MESSAGE-----
  174. Version: GnuPG v1.4.10 (GNU/Linux)
  175.  
  176. hQEMA4EHQpxnGbsmAQf+Muiar2h10+1fiNI+KH8ygdHGFw/DMgk66a8vamt8SRUd
  177. kkjFpH6YwMqxUYo9PJugI3l1N+J7Wvw+N5aypUuwPeb5R9Qkab3xMp8Lg5rnuDsp
  178. y8L4bffxdfpHIlWIas1sSeePX5A9VdGkRoUX+VulWoS28VgNPeOXt4Bu2oLCVpZ0
  179. rLGZF5sscfkv+AMwCg7QJMrLu48G1ImaWtH2YJzd4cTFNbVJ10CrjDLCiet1List
  180. B1Zau72zKzk6jBnE+YiwY0WSu/NujxI4bRrGXwSMt2D3ODLZ/TwHQX7+towj2PLY
  181. zGxShI6fEgVGgq/9+DVZGYacq3drQM7GLgHOtcpHE9KvAepeTvIxblDeD9AcmXUv
  182. ORif4OvePHh0isGJEKd8wUsTu2TUaFGF7T0+Kewni6qwNoEWEsdH1CioB2Z0g7Ju
  183. niOH8JySQyxWNQS/9KWDLUX9EACzpudXONhsyg43nrzp8BhvMXKL0x3t58urhOdh
  184. 9dfjsAshFQpydcIkww/zmrwtBWZtrYWc6mfefP0L15wIDqdEXGOd3t3g5OjRwZF3
  185. gd4WhJ3YVULSXN12KIerRw==
  186. =qwVg
  187. -----END PGP MESSAGE-----
  188.  
  189. root@bt:~/lab2# gpg --sign -o key_signed.txt -a aes.key.asc
  190.  
  191. You need a passphrase to unlock the secret key for
  192. user: "[redacted] (lab2 rsa public rsa private key pair) <[redacted]>"
  193. 2048-bit RSA key, ID 587AC911, created 2013-02-17
  194.  
  195. gpg: gpg-agent is not available in this session
  196. root@bt:~/lab2# ls
  197. aes.key aes.key.asc cmpsc443public.key key_signed.txt lab2_encr.txt lab2.txt public.key steps1to10
  198. root@bt:~/lab2# cat key_signed.txt
  199. -----BEGIN PGP MESSAGE-----
  200. Version: GnuPG v1.4.10 (GNU/Linux)
  201.  
  202. owFl0l2I2wQAwPFe9+Vy3Hanc2woszsO3cy8Num37IZpkyZpk7Rp2iatTEibz/ba
  203. pvlo0p4OPEFxgpuCHPOEMbhDkfPpThHFKQhyE5FxB3ObIuhAwSETwcncPcgGPvl/
  204. /D//zo5t8/lH4PXKpjC8NDHygX+zPirK1nRLHkyLVoM9PD7x1L1SGE4ygQJeCNAY
  205. xyE4dv8CFdm09G7n6QDecQp4oA9NR6ahUOAIzpSDlN5xvKMAoLEYjUQwgjW8Dl63
  206. 2girgLSjiyasQSEQUnSGBHNEYqBKBJ5xgyittmIxMdEX23aCK5YloNVqZgwiVnXp
  207. nleudpOFrKOS4VmIAbNxvu+CTFQcGGXHLcj1aDHJtsR62KONBKVGzY6DWgYwSFCR
  208. uqJ4kmIQ5CxPihZkcbJcEKJIsiLhrWK3LIAVZ5bvcnCiojIFOS/YkZQDd6l0xaiF
  209. AJPCa5moZTWUVh9EaDetxtksbVJOJIFDZFvkbQKuZodSpFHKMPVKFgqlzSZKpXXZ
  210. hijdsoEUVBOdODzMDVuxZqqDgVXdrYZ4zgkyTtMjI/WiiQsuR9swGs6jVC1YcglW
  211. iIN2123CBaoKDHGP08iYgqkVXO0FkyBaqeFVsdELSyZLx3FKJfJ2wyCwZK6PyIZc
  212. 6pNefRaV0STSaAvlPpAv6kok35cLhBbSLTyL5aSEW7ZKDlwqixk8Ey+FwJzsdvRY
  213. z2W6GI9ZEgGl9W4KroXUeNYBOnqeSGQHHDvweIblgskcj1JlIYkh6aHhSEKe0ayB
  214. Ggl3zKGRSGl9WshRIS9sRxOOqeUlDUhKStNCLC3DGgOpQbZcNzhsm66d4mu2WeUb
  215. sbYiK4UQBUVdEu1JmIDnpbAdVqP5ZtGtZcKAKkV4LRuuVsoUJzAQnCNls+jOzAAz
  216. PbeiAvdFYgz6f6Wvjjy63Tfi9+3c4b8H2gfsHv9PPLZ3192drXNfn159e+fa+cdO
  217. oSs/TI59863/l5W1z5bPPOfLH/yyCh64sfsvjZDetc+uDVen9p67dmHsqruAXXy/
  218. 5d9YKl7fton8+NF+y395Abk7svLV+WOfcovro0tHkat7tr7nrh8XPpw7+Ru0n89d
  219. GEy99dON5uLnD792wtq6CF+7/Ypve+DI7BP2k7fihQcu828i1M2lE3Ppv/Hl9V2/
  220. v+A486t3rpxS3qBPxzKPHN/x5+O+Q/b8sfk2v3HTe+ZSe9+tZw+vPr+nKLz8xZVD
  221. L0rguL61oB+gJhdHT05MDt+5/c/PzYD2qzX+EsPpZ6b8370+t5x+sM7MPPTenU82
  222. Ph4N7ftj/OBCBP0X
  223. =ZfM8
  224. -----END PGP MESSAGE-----
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement