# PGP Encryption Procedures

### Step 1: Generate API Key <a href="#pgpencryptionprocedures-step1-generateapikey" id="pgpencryptionprocedures-step1-generateapikey"></a>

$gpg –gen-key

a. Select (1) RSA and RSA

* hit enter key

<br>

b. Select 2048 as keysize

* hit enter key

<br>

c. Specify how long the key should be validd. Is this correct? (y/N):

* type y

<br>

e. Real Name:

* type firstname lastname

<br>

f. Email address:

* type email address

<br>

g. Comment:

* type any comment

<br>

h. Enter passphrase:

* enter a phrase with non related words and remember it

<br>

i. Repeat passphrasej. Wait for the result by operating computer in various ways.k. On finish, you can see the user-id(uid) like “firstname lastname (comment) < email address >”  You can also check “uid” with the command “gpg –list-key”Note: It will take some time to get the uid. Please be patient.

### Step 2: Create public key <a href="#pgpencryptionprocedures-step2-createpublickey" id="pgpencryptionprocedures-step2-createpublickey"></a>

$ gpg –export -a “uid” > public.key

### Step 3: Create private key <a href="#pgpencryptionprocedures-step3-createprivatekey" id="pgpencryptionprocedures-step3-createprivatekey"></a>

$ gpg –export-secret-key -a “uid” > private.key

### Step 4: Encrypt a file <a href="#pgpencryptionprocedures-step4-encryptafile" id="pgpencryptionprocedures-step4-encryptafile"></a>

$ gpg –encrypt –output output-file –recipient “uid” input-fileNote: Generally, the file will be encrypted by Konnektive.

### Step 5: Decrypt a file <a href="#pgpencryptionprocedures-step5-decryptafile" id="pgpencryptionprocedures-step5-decryptafile"></a>

\#### $ gpg –decrypt –output output-file input-filetype passphrase
