PGP*, Version 6.5.1
06-99. Printed in the United States of America.
PGP, Pretty Good, and Pretty Good Privacy are registered trademarks of Network Associates,
Inc. and/or its Affiliated Companies in the US and other countries. All other registered and
unregistered trademarks in this document are the sole property of their respective owners.
The software provided with this documentation is licensed to you for your individual use
under the terms of the End User License A greement and Limited Warranty provided wi th the
software. The information in this document is subject to change without notice. Network
Associates Inc. does not warrant that the information meets you requirements or that the
information is free of errors. The information may in clude technical inaccuracies or
typographical errors. Changes may be made to the information and incorporated in n ew
editions of this document, if and when made available by Network Associates Inc.
Export of this software and documentation may be subject to co mpliance with the rules and
regulations promulgated from time to time by the Bureau of Export Administration, United
States Department of Commerce, which restrict the export and re-export of certain products
and technical data.
Network Associates, Inc. (408) 988-3832 main
3965 Freedom Circle(408) 970-9727 fa x
Santa Clara, CA 95 054http://www .n ai.com
info@nai.com
* is sometimes used instead of the ® for registered trademarks to protect marks registered outside of the
U.S.
LIMITED WARRANTY
Limited Warranty.
substantially in accordance with the accompanyi ng written materials for a period of sixty (60)
days from the date of original purchase. To the extent allowed by applicable law, implied
warranties on the Software Product, if any, are limited to such sixty (60) day period. Some
jurisdictions do not allow limitations on duration of an implied warranty, so the above
limitation may not apply to you.
Customer Remedies.
exclusive remedy shall be, at Network Associates Inc’s option, either (a) return of the purchase
price paid for the license, if any or (b) repair or replacement of the Software Product that does
not meet Network Associates Inc’s limited warranty and which is returned at your expense to
Network Associates Inc. with a copy of your receipt. This limited warranty is void if failure of
the Software Product has resulted from accident, abuse, or misapplication. Any repaired or
replacement Software Product will be warranted for the remainder of the original warranty
period or thirty (30) days, whichever is longer. Outside the United States, neither these
remedies nor any product support services offered by Network Associates Inc. are available
without proof of purchase from an authorized international source and may no t be available
from Network Associates Inc. to the extent they subject to restrictions under U.S. export control
laws and regulations.
NO OTHER WARRANTIES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW, AND EXCEPT FOR THE LIMITED WARRANTIES SET FORTH HEREIN, THE
SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” AND NETWORK
ASSOCIATES, INC. AND ITS SUPPLIERS DISCLAIM ALL OTHER WARRANTIES AND
CONDITIONS, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, CONFORMANCE WITH DESCRIPTION, TITLE AND NON-INFRINGEMENT OF
THIRD PARTY RIGHTS, AND THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT
SERVICES. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY
HAVE OTHERS, WHICH VARY FROM JURISDICTION TO JURISDICTION.
Network Associates Inc. warrants th at the Software Product will perform
Network Associates Inc’s and its suppliers’ entire liability and your
LIMITATION OF LIABILITY. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW, IN NO EVENT SHALL NETWORK ASSOCIATES, INC. OR ITS SUPPLIERS BE LIABLE
FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL OR EXEMPLARY
DAMAGES OR LOST PROFITS WHATSOEVER (INCLUDING, WITHOUT LIMITATION,
DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF
BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE
USE OR INABILITY TO USE THE SOFTWARE PRODUCT OR THE FAILURE TO PROVIDE
SUPPORT SERVICES, EVEN IF NETWORK ASSOCIATES, INC. HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES. IN ANY CASE, NETWORK ASSOCIATES, INC’S
CUMULATIVE AND ENTIRE LIABILITY TO YOU OR ANY OTHER P ARTY FOR ANY LOSS
OR DAMAGES RESULTING FROM ANY CLAIMS, DEMA NDS OR ACTIONS ARISING OUT
OF OR RELATING TO THIS AGREEMENT SHALL NOT EXCEED THE PURCHASE PRICE
PAID FOR THIS LICENSE. BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF LIABILITY, THE ABOVE LIMITATIONS MAY NOT
APPLY TO YOU.
Welcome to PGP! With PGP for Freeware, you can easily and securely protect
the privacy of your email messages and file attachments by encrypting them
so that only the intended recipients can read them. You can also digitally sign
messages and files, which ensures their authenticity. A signed messages
verifies that the information in it has not been tampered with in any way.
This guide describes how to use PGP
and Windows NT. PGP Freeware has many new features, which are described
in “What’s new in PGP version 6.5.1” on page 12.
If you are new to cryptography and would like an overview of the terminology
and concepts you will encounter while using PGP, see An Introduction to Cryptography.
®
Freeware for Windows 95, Windows 98,
User’s Guide11
Preface
What’s new in PGP version 6.5.1
This version of PGP includes these new features:
• PGPnet. PGPnet is a landmark product in the history of PGP. PGPnet
secures all TCP/IP communications between itself and any other machine
running PGPnet. It is also fully interoperable with the Gauntlet GVPN
firewall/gateway providing a complete solution for corporate remote
access VPNs using the industry standard IPSec (Internet Protocol Security)
and IKE (Internet Key Exchange) protocols. PGPnet has also been
successfully tested with Cisc o routers (requires Cisco IOS 12.0( 5) or later
with IPSec TripleDes Feature Pack), Linux FreeS/WAN 1.0, and many
others. Refer to Chapter 7, “P GPnet V irtual P rivate Networki ng,” for more
information and instruction s on using PGPnet.
• Self-Decrypting Archives. PGP can now encrypt files or folders into
Self-Decrypting Archives (SDA) which can be sent to users who do not
even have PGP. The archives are completely independent of any
application, and are compressed and protected by PGP's strong
cryptography. Automated Freespace Wiping. PGP's Freespace Wipe
feature now allows you to use the Windows Task Scheduler to schedule
periodic secure wiping of the freespace on your disk. This ensures that
previously deleted files are securely wiped.
• Hotkeys. The Use Current Window feature is significantly enhanced by the
addition of Hotkeys. You can now set hotkey combinations for the
Encrypt/Decrypt/Sign functions.
• Fingerprint word list. When verifying a PGP public key fingerprint, you
can now choose to view the fingerprint as a word list instead of
hexadecimal characters. The word list in the fingerprint text box is made up
of special authentication words that PGP uses and are carefully selected to
be phonetically distinct and easy to understand without phonetic
ambiguity.
• Smart Word Wrapping. The word wrapping in PGP now automatically
rewraps paragraphs and even quoted paragraphs resulting in much
cleaner signed messages.
How to contact Network Associates
Customer service
To order products or obtain product information, contact the Network
Associates Customer Care department at (408) 988-3832 or write to the
following address :
12PGP Freeware
Network Associates, Inc.
McCandless Towers
3965 Freedom Circle
Santa Clara, CA 95054-1203
U.S.A.
Comments and feedback
Network Associates appreciates your comments and feedback, but incurs no
obligation to you for information you submit. Please address your comments
about PGP product documentation to: Network Associates, Inc., 3965
Freedom Circle Santa Clara, CA 95054-1203 U.S.A.. You can also e-mail
comments to tns_documentation@nai.com.
Year 2000 compliance
Information regarding NAI products that are Year 2000 compliant and its Year
2000 standards and testing models may be obtained from NAI’s Web site at
http://www.nai.com/y2k.
For further information, email y2k@nai.com.
Preface
Recommended Readings
Non-Technical and beginning technical books
• Whitfield Diffie and Susan Eva Landau, “Privacy on the Line,” MIT Press;
ISBN: 0262041677
This book is a discussion of the history and policy surrounding
cryptography and communications security. It is an excellent read, even for
beginners and non-technical people, but with information that even a lot of
experts don't know.
• David Kahn, “The Codebreakers” Scribner; ISBN: 0684831309
This book is a history of codes and code breakers from the time of the
Egyptians to the end of WWII. Kahn first wrote it in the sixties, and there is
a revised edition pu blished in 1996. This book won't teach you anything
about how cryptography is done, but it has been the inspiration of the
whole modern generation of cryptographers.
User’s Guide13
Preface
• Charlie Kaufman, Radia Perlman, and Mike Spencer, “Network Security:
Private Communication in a Public World,” Prentice Hall; ISBN:
0-13-061 466-1
This is a good description of network security systems and protocols,
including descriptions of what works, what doesn't work, and why.
Published in 1995, so it doesn't have many of the latest advances, but is still
a good book. It also contains one of the most clear descriptions of how DES
works of any book written.
Intermediate books
• Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and
Source Code in C,” John Wiley & Sons; ISBN: 0-471-12845-7
This is a good beginning technical book on how a lot of cryptography
works. If you want to become an expert, this is the place to start.
• Alfred J. Menezes, Paul C. van Oorschot, and Scott Vanstone,
“Handbook of Applied Cryptography,” CRC Press; ISBN: 0-8493-8523-7
This is the technical book you should get after Schneier. There is a lot of
heavy-duty math in this book, but it is nonetheless usable for those who do
not understand the math.
• Richard E. Smith, “Internet Cryptography,” Addison-Wesley Pub Co;
ISBN: 020192480
This book describes how many Internet security protocols. Most
importantly, it describes how systems that are designed well nonetheless
end up with flaws through careless operation. This book is light on math,
and heavy on practical information.
14PGP Freeware
• William R. Cheswick and Steven M. Bellovin, “F irewalls and Internet
Security: Repelling the Wily Hacker” Addison-Wesley Pub Co;
ISBN: 0201633574
This book is written by two senior researcher at AT&T Bell Labs, about
their experiences maintaining and redesigning A T&T's Internet
connection. Very readable.
Advanced books
• Neal Koblitz, “A Course in Number Theory and Cryptography”
Springer-Verlag; ISBN: 0-387-94293-9
An excellent graduate-level mathematics textbook on number theory and
cryptography.
• Eli Biham and Adi Shamir, “Differential Cryptanalysis of the Data
Encryption Standard,” Springer-Verlag; ISBN: 0-387-97930-1
This book describes the technique of differential cryptanalysis as applied to
DES. It is an excellent book for learning about this techni que.
1Installing PGP
This chapter describes how to install and run PGP Freeware Windows
software. This chapter also provides a quick overview of the procedures you
will normally follow in using the product.
Before you begin installing PGP be sure to review the system requirements
outlined below.
System requirements
To install PGP on a Windows 95, Widows 98, or Windows NT system, you
must have:
• Windows 95, Windows 98, or Windows NT 4.0 (Service Pack 3 or later)
•32 MB RAM
•16 MB Hard Disk Space
If you plan to run PGPnet on the system, you must also have:
•Microsoft TCP/IP
1
• A compatible LAN/WAN network adapter
• Windows 95b (OSR2) if you are installing on a Windows 95 system
User’s Guide15
Installing PGP
Compatibility with other versions
PGP has gone through many revisions since it was released by Phil
Zimmermann as a freeware product in 1991. Although this version of PGP
represents a significant rewrite of the original program and incorporates a
completely new user interface, it has been designed to be compatible with
earlier versions of PGP. This means that you can excha nge secure email with
people who are still using these older versions of the product:
• PGP 2.6 (Distributed by MIT)
• PGP for Personal Privacy, Version 5.0 - 5.5
• PGP for Business Security or PGP for Email and Files Version 5.5
• PGP Desktop Security or PGP for Personal Privacy Version 6.0
NOTE: PGP desktop products that are version 5.0 and later may require
the RSA add-on for backward compatibility.
Upgrading from a prev ious version
If you are upgrading from a previous version of PGP (from PGP, Inc.,
Network Associates, Inc. or ViaCrypt), you may want to remove the old
program files before installing PGP to free up some disk space. However, you
should be careful not to delete the private and public keyring files used to store
any keys you have created or collected while using the previous version.
When you install PGP, you are given the option of retaining your existing
private and public keyrings, so you don’t have to go to the trouble of
importing all of your old keys. To upgrade from a previous version, follow the
appropriate steps listed next.
16PGP Freeware
To upgrade from PGP Version 2.6.2 or 2.7.1
1. Exit all programs or open applications.
2. Make backups of your old PGP keyrings on another volume. In PGP for
Windows versions 2.6.2 and 2.7.1, your public keys are stored in
“pubring.pgp” and your private keys are stored in “secring.pgp”. In
versions 5.x - 6.5, your public keys are stored in “pubring.pkr” and your
private keys are stored in “secring.skr”.
Installing PGP
Ð TIP: Make two separate backups of your keyrings onto two
different floppy disks just to be safe. Be especially careful not to lose
your private keyring; otherwise you will never be able to decrypt
any email messages or file attachments encrypted with the lost keys.
Store the keyrings in a secure place where only you ha ve access to
them.
3. When you have succes sf ully backed up your old keyrings, remove or
archive the (old) PGP software. You have two options here:
• Manually delete the entire old PGP folder and all of its contents; or
• Manually delete the old PG P program and archive the remaining
files, especially the configu ration and keyring files.
4. Install PGP version 6.5.1 using the provided installer.
5. Restart your computer.
To upgrade from PG P Ver sion 5. x
If you are upgrading from PGP version 4.x or 5.x, follow the installation
instructions outlined in “Installing PGP” below.
User’s Guide17
Installing PGP
Installing PGP
You can install the PGP Freeware software from a CD-ROM or from
downloaded files. The self-extracting file, Setup.exe, automatically extracts
and steps you through the installation.After you install the software, you can
create your private and public key pair and begin using PGP. Refer to the
PGPWinUsersGuide.pdf file included with the program for instructions on
using PGP.
To install PGP Freeware for Windows systems, carefully follow the steps
outlined below.
To install PGP
1. Exit all programs currently running on your computer, then do one of the
following:
• To install from a CD-ROM, insert it into the CD-ROM drive.
The Setup program automatically starts. If, however, the Setup
program does not initiate, double-click Setup.exe in the PGP fo ld er
on the CD-ROM.
• To install from downloaded files, extract the compressed
installation files onto your computer.
Double-click on Setup.exe to start the installer.
2. The Setup program searches for open programs and prompts you to
close them.
If you have PGP version 4.x - 6.x currently installed , the PGP setup
program prompts you to uninstall the old PGP files. Click Yes to
automatically uninstall the old version. Your keyring files are saved in a
file named Old Keyrings.
You must reboot your computer after uninstallin g the files. Once your
computer reboots, the installer continues.
The PGP Installation screen appears.
3. Review the instructions in the PGP Welcome dialog box, then click Next.
The Network Associates license agreement appears.
4. Review the license agreement information, then click Yes to accept the
licensing terms.
18PGP Freeware
Installing PGP
The Whatsnew.txt file appears listing the new features and other
important information regarding PGP version 6.5.1.
5. Review the Whatsnew.txt file, then click Next.
6. Register your product by enterin g yo ur name and in the User Information dialog box.
7. Click Next.
8. Click Browse to navigate to a destination directory for your PGP files or
accept the default directory. Click Next to continue.
The Select Components dialog box appears, as shown in Figure 1-1.
Figure 1-1. PGP Select Components dialog box
9. Clear the components that you do not want to install. By default, each
option is selected. Your installation options are:
• PGP Key Management (required). This item installs the PGP
program. You must install the Key Management utilities.
• PGPnet. Select this option to install the PGPnet program. PGPnet, a
Virtual Private Network (VPN), is an easy-to-use encryption
application that allows you to communicate securely and
economically with other PGPnet users throughout the world.
• PGP Eudora Plug-in. Select this option if you want to integrate PGP
functionality with your Qualcomm Eudora email program. PGP
version 6.5.1 supports Eudora versions 3.05 and later.
User’s Guide19
Installing PGP
• PGP Microsoft Exchange/Outlook Plug-in. Select this option if you
want to integrate PGP functionali ty with your Microsoft
Exchange/Outlook email program. PGP version 6.5.1 supports
Outlook 97 and 98.
• PGP Microsoft Outlook Express Plug-in. Select this option if you
want to integrate PGP functionality with your Microsoft Outlook
Express email program. PGP version 6.5.1 supports the version that
is included with Internet Explorer versions 4.x.
• PGP User’s Manual (Adobe Acrobat format). Select this option to
install the PGP User’s Guide.
• PGP CommandLine. Select this option if you want to install the
command line version of PGP for Wi n d ow s NT systems. This is for
use as a client only. Batch server processes require additional licensing.
10. Click Next.
A dialog box appears, alerting you that the installer is ready to copy files.
11. Review the installation settings, then click Next.
The PGP files are copied to the computer.
12. If you have keyrings on your computer from a previous version of PGP,
click Yes to use your exis ting keyrings.
A browse dialog box appears. Browse to locat e y our public keyring,
Pubring.pkr, and your private keyring, Secring.skr.
If you do not have keyrings on your computer, click No. When you first
open the PGPkeys application, you are prompted to create a keypair.
13. If you chose to install the PGPnet application, the PGPnet Network Adapter List appears listing the network adapters found on your system,
as shown in Figure 1-2.
Figure 1-2. PGPnet Network Adapter List
20PGP Freeware
Installing PGP
If you want to communicate securely over a modem, select yo ur WAN
adapter (for example, Remote Access WAN Wrapper or dialup adapter).
If you want to communicate securely over an Ethernet connection, select
your LAN adapter (for example, 3COM Megahertz LAN PC Card).
When you have made your selection, click OK.
NOTE: On Windows 98 computers, WAN is listed as “Dialup
Adapter” instead of “Remote WAN Wrapper.”
The installation program binds the PGPnet driver to the adapter you
selected and configures your computer to use the PGPnet application.
14. If you want to restart your computer automatically, select Yes, I want to restart my computer now.
15. Click Finish to complete the PGP installation and reboot your computer.
NOTE: You must reboot your computer if you install PGPnet.
That’s it! PGP is installed on your computer.
User’s Guide21
Installing PGP
22PGP Freeware
2Using PGP
PGP is based on a widely accepted encryption technology known as public key
cryptography in which two complementary keys, called a key pair, are used to
maintain secure communications. One of the keys is designated as a private key
to which only you have access and the other is a public key which you freely
exchange with other PGP users. Both your private and your public keys are
stored in keyring files, which are accessible from the PGPkeys window. It is
from this window that yo u perform all your key management func tions.
This section takes a quick look at the procedures you normally follow in the
course of using PGP. For details concerning any of these procedures, refer to
the appropriate chapters in this book. For a comprehensive overview of PGP
encryption technology, refer to “An Introduction to Cryptography,” which is
included with the product.
Basic steps for using PGP
1. In stall PG P on your computer. Refer to Chapter 1, “Installing PGP” for
complete installation instru ctions.
2. Create a private and public key pair.
2
Before you can begin using PGP, you need to gen erate a key pair. A PGP
key pair is composed of a private key to which only you have access and a
public key that you can copy and make f reel y available to everyone with
whom you exchange information.
You have the option of creating a new key pair immediately after you have
finished the PGP installation procedure, or you can do so at any time by
opening the PGPkeys application.
For more information about creating a private and public key pair, refer to
“Making a key pair” on page 36.
3. Exchange public keys with others.
After you have created a key pair, you can begin corresponding with other
PGP users. You will need a copy of their public key and they will need
yours. Your public key is just a block of text, so it’s quite easy to trade keys
with someone. You can include your public key in an email message, copy
it to a file, or post it on a public or corporate key server where anyone can
get a copy when they need it.
User’s Guide23
Using PGP
For more information about exchanging public keys, refer to “Distributing
your public key” on page 60 and “Obtaining the public keys of others” on
page 64.
4. Validate public keys.
Once you have a copy of someone’s publ ic key, you can add it to your
public keyring. You should then check to make sure that the key has not
been tampered with and that it really belongs to the purported owner. You
do this by comparing the unique fingerprint on your copy of someone’s
public key to the fingerprint on that person’s orig inal key. When you are
sure that you have a valid public key, you sign it to indicate that you feel
the key is safe to use. In addition, you can grant the owner of the key a level
of trust indicating how much confidence you have in that person to vouch
for the authenticity of someone else’s public key.
For more information about valida ting your keys, refer to “Verifying the
authenticity of a key” on page 68.
5. Encrypt and sign your email and fi les.
After you have generated your key pair and have exchanged public keys,
you can begin encrypting and signing email messages and files.
PGP works on the data generated by other applications. Therefore the
appropriate PGP functions are designed to be immediately available to you
based on the task you are performing at any given moment. There are
several ways to encrypt and sign with PGP:
• From the System tray (PGPtray). PGPtray includes utilities to
perform cryptographic tasks on data on the Clipboard or in the
current window. See “Using PGPtray” on page 29.
• From within supported email applications (PGP email plug-ins).
The plug-ins enable you to secure your email from within the
supported email application. See “Using PGP within supported
email applications” on page 32.
• From PGPtools. PGPtools enables you to perform cryptogr aphic
tasks within applications not supported by plug-ins, plu s othe r
security tasks, such as wiping files from your disk. See “Using
PGPtools” on page 31.
• From the Windows Explorer File menu. You can encrypt and sign
or decrypt and verify files such as word processing documents,
spreadsheets and video clips directly from the Windows Explorer.
See “Using PGP from Windows Explorer” on page 31.
24PGP Freeware
For more information about encrypting email, refer to “Encrypting and
signing email” on page 71. For more informatio n about decrypting files,
refer to “Using PGP to encrypt and decrypt f iles” on page 83.
6. Decrypt and verify your email and files.
When someone sends you encrypted data, you can unscramble the
contents and verify any appended signature to make sure that the data
originated with the alleged sender and that it has not been altered.
• If you are using an email application that is supported by the
plug-ins, you can decrypt and verify your messages by selecting the
appropriate options from your applicat ion’s tool bar.
• If your email application is not supported by the plug-ins, you can
copy the message to the clipboard and perform the appropriate
functions from there. If you want to decrypt and verify files, you can
do so from the Clipboard, Windows Explorer, or by using PGPtools.
You can also decrypt encrypted files stored on your computer, and
verify signed files to ensure that they have not been tampered with.
For more information about securing email, refer to “Decrypting and
verifying email” on page 79. For more information about securing files,
refer to “Using PGP to encrypt and decrypt f iles” on page 83.
Using PGP
7. Wipe files.
When you need to permanently delete a file, you can use the Wipe feature
to ensure that the file is unrecoverable. The file is immediately overwritten
so that it cannot be retrieved using disk recovery software.
For more information about wiping files, refer to “Using PGP Wipe to
delete files” on page 93.
User’s Guide25
Using PGP
Using PGPkeys
When you choose PGPkeys from PGPtray, the PGPkeys window opens
(Figure 2-1) showing the private and publi c ke y pairs you have created for
yourself as well as any public keys of other users that you have added to your
public keyring.
26PGP Freeware
Figure 2-1. PGPkeys
(If you have not already created a new key pair, the PGP Key Generation
Wizard leads you through the necessary steps. However, before going
through the process of creating a new key pair, you should see Chapter 3,
“Making and Exchan ging Keys,” for complete details about the various
options.)
From the PGPkeys window you can create new key pairs and manage all of
your other keys. For instance, this is where you examine the attributes
associated with a particular key, sp eci fy how confident you are that the key
actually belongs to the alleged owner, and indicate how well you trust the
owner of the key to vouch for the authenticity of other users’ keys. For a
complete explanation of the key management functions you perform from the
PGPkeys window, see Chapter 6.
PGPkeys icon definitions
PGPkeys menu bar icons
The following table shows all of the icons used in the PGPkeys menu bar,
along with a description of their functions .
IconFunction
Launches the Key Generation Wizard. Click this button to create a
new key pair.
Revokes the currently selected key or signature. Click this button to
disable a key or revoke a signature. Revoking a key will prevent
anyone from encrypting data to it.
Allows you to sign the curren tly selec ted key. By si gning the ke y, you
are certifying that the key and user ID belong to the identified user.
Deletes the currently selected item. Click this button to remove a
key, signature, or photographic ID.
Using PGP
Table 2-1. PGPkeys menu bar icons
Opens the Key Search window which allows you to search for keys
on local keyrings and remote servers.
Sends the currently selected key to the server. Click this button to
upload your key to the Certificate or domain server.
Updates the currently selected key from a Certificate or domain
server. Click this button to import keys from a Certificate or domain
server to your keyring.
Displays the Properties dialog box for the currently selected key.
Click this button to view the General and Subkey properties for a
key.
Allows you to import keys from file on to your keyring.
Allows you to export the selected key to a file.
User’s Guide27
Using PGP
PGPkeys window icons
The following table shows all of the mini-icons used in the PGPkeys window,
along with a description of what they represent.
Table 2-2. PGPkeys window icons
IconDescription
A gold key and user represents your Diffie-Hellman/DSS key pair,
which consists of your private key and your public key.
A single gold key represents a Diffie-Hellman/DSS public key.
A gray key and user represen ts you r RSA ke y pair, wh ich c onsists of
your private key and your public key.
A single gray key represents an RSA public key.
When a key or key pair is dimmed, the keys are temporarily
unavailable for encrypting and signing. You can disable a key from
the PGPkeys window, which prevents seldom-used keys from
cluttering up the Key Selection dialog box.
This icon indicates that a photographic user ID accompanies the
public key.
A key with a red X indicates that the key has been revoked. Users
revoke their keys when they are no longer valid or have been
compromised in some way.
A key with a clock indicates that the key has expired. A key’s
expiration date is established when the key is created.
An envelope represents the owner of the key and lists the user
names and email addresses associated with the key.
A gray circle indicates that the key is invalid.
A green circle indicates tha t the y key is val id. An add itiona l red circ le
in the ADK column indicates that the key has an associated
Additional Decryption Key; an additional gray circle in the ADK
column indicates tha t the key does n ot have an a ssociated Additi onal
Decryption Key.
A green circle and user indicates that you own the key, and that it is
implicitly trusted.
28PGP Freeware
Using PGP
Table 2-2. PGPkeys window icons
A pencil or fountain pen indicates the signatures of the PGP users
who have vouched for the authenticity of the key.
- A signature with a red X through it indicates a revoked signature.
- A signature with a dimmed pencil icon indicates a bad or invalid
signature.
- A signature with a blue arrow next to it indicates that it is
exportable.
A certificate represents an X.509 certificate, a recognized electronic
document used to prove identity and public key ownership over a
communication network.
A clock indicates an expired X.509 certificate.
A red X indicates a revoked X.509 certificate.
An empty bar indicates an invalid key or an untrusted user.
A half-filled bar indicates a marginally valid key or marginally trusted
user.
A striped bar indicates a valid key that you own and is implicitly
trusted, regardless of the signatures on the key.
Using PGPtray
You can access many of the main PGP functions by clicking the lock icon ()
which is normally located in the System tray, and then choosing the
appropriate menu item. (If you can’t find this icon in your System tray, run
PGPtray from the Start menu.)This feature provides immediate access to the
PGP functions regardless of which application you are using and is especially
useful if you are using an email application th at is not supported by the PGP
plug-ins.
NOTE: If you installed PGPnet, this icon will appear in your System
tray instead of the lock icon. The look of the PGPtray icon tells you if
PGPnet is off or not installed (gray lock), installed (yellow lock on a
network), or installed but not working (yellow lock on a network with a
red X).
A full bar indicates a completely valid key or a completely trusted
user.
User’s Guide29
Using PGP
Performing PGP func tions from the Clipbo ard or Current
Window
If you are using an email application that is not supported by the PGP
plug-ins, or if you are working with text generated by some other application,
you can perform your encryption/decryption and signature/verification
functions via the Windows Clipboard or within the current application
window.
Via the Windows Clipboard
For instance, to encrypt or sign text, you copy it from your application to the
Clipboard (
then paste (
intended recipients. When you receive an encrypted or signed email message,
you simply reverse the process and copy the encrypted text, known as
ciphertext from your a pplication to the Clipboard, decrypt and verify the
information, and then view the contents. After you view the decrypted
message, you can decide whether to save the information or retain it in its
encrypted form.
Within the Current Window
CTRL +C), encrypt and sign it using the appropriate PGP functions,
CTRL +V) it back into your application before sending it to the
You can perform the same cryptographic tasks using the Current Window
menu item, which copies the text in the current window to the Clipboard and
then performs the selected task.
Figure 2-2. PGPtray’s Current Window feature
30PGP Freeware
Loading...
+ 220 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.