PGP COMMAND-LINE GUIDE

Secure Communication and Encryption Tools

GnuPG
OpenPGP
Cryptography

Security Tools Suite

Public Key Block

-----BEGIN PGP PUBLIC KEY BLOCK----- mDMEZ1wQ4RYJKwYBBAHaRw8BAQdArkE1W3LBkW1Mqii3z3RbP8I0khz5q1hAFNTs vn+I4H20H0ExMTMxIDxudWxscG9pbnRlckBpMnBtYWlsLm9yZz6IkgQTFgoAOwIb IwULCQgHAgIiAgYVCgkICwIEFgIDAQIeBwIXgBYhBEsKOGUw14kVdDXcdIkTj7Uv 3X/BBQJnXMqJAAoJEIkTj7Uv3X/BzdsA9ia8VCHcGskWvRbKi/fnWXehMYNLilhJ NL1SoboggssBAKIEa/WRGHTyKq+Gw/Ac04yfgceZQhTwsQfzTTW4uCoJiJMEExYK ADsWIQRLCjhlMNeJFXQ13HSJE4+1L91/wQUCZ1w+AgIbIwULCQgHAgIiAgYVCgkI CwIEFgIDAQIeBwIXgAAKCRCJE4+1L91/wRRiAP4xLROw5JScqno+e4t1H5myAeBJ rTMA247GdO8L5lqybQD5AfRTuK0wqdh5ZfC9cQ9zx6GI/NFdqLyjhlhgtHN7Dgm0 HEExMTMxIDxudWxscG9pbnRlckBtYWlsLmkycD6IkwQTFgoAOwIbIwULCQgHAgIi AgYVCgkICwIEFgIDAQIeBwIXgBYhBEsKOGUw14kVdDXcdIkTj7Uv3X/BBQJnXMqa AAoJEIkTj7Uv3X/BEY8BAM2uaLvIluxDkeU5WL8rEC5XcS14J9bA1qIHbuov4noV APsGLo3ne0cQDSvcLa29Nqf10B5uHFZKWgW0b26a4jU9Cbg4BGdcEOESCisGAQQB l1UBBQEBB0DyGoyitgg59P9w5FDY3URGUD1qAEiOo1EWUUiicMgKXwMBCAeIeAQY FgoAIBYhBEsKOGUw14kVdDXcdIkTj7Uv3X/BBQJnXBDhAhsMAAoJEIkTj7Uv3X/B 8S0BAK8H5ngZpjYzVFS3juGnF1QA0cc8K4Bj84c7pBAjzoJ6AQC1e+rrbH9Gm143 7OXjQmTGQLq+BgrHVblNoIAWVrkTAg== =mny6 -----END PGP PUBLIC KEY BLOCK-----

Key ID (Long): 4B0A386530D789157435DC7489138FB52FDD7FC1

GnuPG Command-Line Tutorial

Below are the essential GnuPG commands for using the key above. Replace example filenames or emails as needed.

Step 1: Save the Key

Save the copied block into a file named public_key.asc.

nano public_key.asc

Step 2: Import the Key

gpg --import public_key.asc

List all imported keys:

gpg --list-keys

Step 3: Encrypt a File

gpg --encrypt --recipient 'A1131' message.txt

Alternative (use recipient email):

gpg -e -r 'nullpointer@i2pmail.org' message.txt

Step 4: Sign a File

gpg --detach-sign document.txt

Step 5: Decrypt / Verify

gpg --decrypt secret.txt.gpg

Verify a detached signature:

gpg --verify document.txt.sig document.txt

Technical Implementation

Core Features

Public Key Cryptography

Asymmetric encryption using RSA/ECC algorithms for secure communication

Digital Signatures

Verify authenticity and integrity of messages and files

Key Management

Import, export, and manage cryptographic keys with trust levels

Security Workflow

End-to-End Encryption
1. Key generation and distribution
2. Message/file encryption with recipient's public key
3. Digital signing with sender's private key
4. Secure transmission and storage
5. Decryption and signature verification