Firstly you have to be familiar with these terms:-
Encryption:- Encryption is the process of encoding data, making it unintelligible and scrambled. In a lot of cases, encrypted data is also paired with an encryption key, and only those that possess the key will be able to open it.
Decryption:- The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
PGP:- PGP stands for “Pretty Good Privacy”. PGP can be used to send messages confidentially. For this, PGP combines symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key.
Encryption is important. There are very few people that would doubt that, especially in media. Too often the places we work in and the people we seek to expose are in a position to intercept, listen and read our communications. There are many tools available, but they are frequently difficult to understand much less use. Today I’m going to explain how to use a simple tool that greatly streamlines the process. It’s only a first step though, and there are many greater levels of security. PGP can, for instance, also be used to encrypt files for transmission. That is outside of the scope of this article though, and there are numerous resources available for people looking to take the next steps.
PGP uses what is called “asymmetrical encryption.” Unlike normal encryption, in which the same password is used to encrypt as well as decrypt, PGP uses one key to encrypt (the “public” key”) and a separate key to decrypt (the “private” key). This means that the public key can be distributed far and wide, to anyone that would want to send you messages.
However, because you keep the only copy of the private key, you are the only one able to decrypt and read messages encrypted with your public key. Also, since the private key is also protected by a regular password, even if the private key falls into the wrong hands they may not be able to decrypt anything.
What you will get from this guide
- The ability to send and receive an end-to-end encrypted email that cannot be read by third parties.
- The ability to sign your email digitally and authenticate signed email from others.
The tool used: – Mailvelope extension
How to use: –
- Open Firefox and add the Mailvelope extension.
- Click the Mailvelope lock icon in your browser toolbar to activate the following screen:
- Click on Dashboard and this window will open.
- You have to click on Manage Keys option.
- Just click on Generate Keys and put Your Own name, Email id and Password and Click Generate.
- You can set a validity of key and set a key size of your choice by clicking on the Advance option.
- Now your key will generate and its take few second .and you will see a message like this:-
“Success! The new key generated and imported into keyring “
8.Now click on Display Keys, for key
- Click on the key to see the details.
10.Click on the Export option to see your Public and private key.
- Now You PGP file is ready, copy this code and simply close the window, now past it into email section by clicking composing mail and put the receiver details properly.
And send it to the receiver.
- Both sender and receiver have to be synchronized with PGP for sending and receiving emails effectively.
- Never share your Private Key with anyone.
- Mailvelope is a freeware. You may use proprietary implementations of Cisco, Symantec and Trend Micro.
- Open the PC-2 and click the mail send by PC-1 and you will see the mail like this
- click on the lock screen and you will redirect to the following page, Now click on import.
- Now you have to click on Display Keys and then another key will be added to the PC-2 ‘s Dashboard.
A PC-1 address is saved there as “firstname.lastname@example.org”. if you open this you will get the Public Key of PC-1.
- Now click on PC-2 key iD and go to Export and copy the link.
- Now close the window and send this code to PC-1(email@example.com)
- Just click on send and send it.
Now open the PC 1 (firstname.lastname@example.org).
- Then now you can see the received mail send by the PC-2 (email@example.com). it shows like:-
- Just click on it. it will automatically redirect you to this import page.
- Click on Import and you will see the message.
“Success! Updated public key 0B32CE76F95A89B6 of user netHacker <firstname.lastname@example.org>”
- Now click on display keys and you can see the public key of PC2 also.
- From now onwards PC-1 and PC-2 both will send encrypted emails to each other. Here is the demo.
23.open PC-1 mail and click on Compose mail, and you will see a window like this, and you will find an icon of Mailvelope just simply click on it and put the PC-2 address, and text whatever you want to write for mail and click on Encrypt.
Here this box will same as the body of email space.
- Now send it and the mail has shown to you like this.
- Now go to PC-2 and check the inbox, and click on the received mail. it will be like this figure
- click the lock icon and it will ask the PC-2 user for a password.
Put the password here.( That password which is you created at the time of generating the key), and the mail will decrypt now. And you will see the original mail in plain text here.