SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Encrypting emails using
Step 1:Installing Kleopatra PGP Step 2: Creating your own certificate
Step 2:Completing personal information
Step 2: Creating your passphrase
Step 3: Exporting your Certificate  and your Secret key
Step 4 : Importing  your recipient certificate from file or server
Step 5: Ataching your secret key and your certificate into email
Step 6 : Encrypting your message
Step 6: Encrypting your message
Step 7 : Sending the email
Encrypting emails using Kleopatra PGP ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its UsesMohsin Ali
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
DIGITAL SIGNATURE ALGORITHM (DSA)
DIGITAL SIGNATURE ALGORITHM (DSA) DIGITAL SIGNATURE ALGORITHM (DSA)
DIGITAL SIGNATURE ALGORITHM (DSA) Catur Setiawan
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
Security Measures
Security MeasuresSecurity Measures
Security Measureshanna91
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Rotor machine,subsitution technique
Rotor machine,subsitution techniqueRotor machine,subsitution technique
Rotor machine,subsitution techniquekirupasuchi1996
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal CryptosystemAdri Jovin
 

Was ist angesagt? (20)

Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
DIGITAL SIGNATURE ALGORITHM (DSA)
DIGITAL SIGNATURE ALGORITHM (DSA) DIGITAL SIGNATURE ALGORITHM (DSA)
DIGITAL SIGNATURE ALGORITHM (DSA)
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Firewalls
FirewallsFirewalls
Firewalls
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
cryptography
cryptographycryptography
cryptography
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Rotor machine,subsitution technique
Rotor machine,subsitution techniqueRotor machine,subsitution technique
Rotor machine,subsitution technique
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 

Mehr von Lupu Cosmin

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftLupu Cosmin
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windowsLupu Cosmin
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuLupu Cosmin
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca MagnifierLupu Cosmin
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs FeedbackLupu Cosmin
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to knowLupu Cosmin
 

Mehr von Lupu Cosmin (9)

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by Microsoft
 
lupucosmin
lupucosminlupucosmin
lupucosmin
 
Dia
DiaDia
Dia
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windows
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntu
 
Diac in ym
Diac in ymDiac in ym
Diac in ym
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca Magnifier
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs Feedback
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to know
 

Encrypting emails using Kleopatra PGP