Encryption Profiles
This feature allows you to create encryption or decryption profiles. An encryption profile should be used in an encryption task to encrypt files. A decryption profile should be used in a decryption task to decrypt files. There are various types of encryption methods supported.
OpenPGP Password Based Encryption & Decryption
This is a symmetrical encryption/decryption method, i.e. the same password is used for encryption and decryption. Two separate profiles are needed, one encryption profile and another decryption profile. Files encrypted using this method can be decrypted by this application and by other applications that support OpenPGP. Similarly, files encrypted in other applications using OpenPGP password based encryption can be decrypted in this software.
OpenPGP Public Key Encryption
This is an asymmetrical encryption method. You should create an encryption profile based on
a Recipients Identity (using his OpenPGP public key file). Files encrypted using this OpenPGP public key can only be decrypted by
the Recipient using his own private key.
OpenPGP Private Key Decryption
This is an asymmetrical decryption method. You should create a decryption profile based on an OpenPGP private key file. This OpenPGP private key can only decrypt files which were encrypted using its corresponding public key.
OpenPGP Private Key Signing
This method is used to sign a file using a private key. During signing, the file is encrypted with a
Senders private key. The corresponding OpenPGP public key can be used by anyone to verify the
Senders signature.
OpenPGP Public Key Verification
This method uses a public key to verify a signed file. The Senders public key is used to verify that the file was signed
by the Sender. This method does not automatically decrypt and output the
original file. Use a Decrypt profile to automatically decrypt the original
Signed file.
Example of Encrypt and Decrypt:
John's customers need to send John important files securely via email.
Only John should be able to read these messages.
If these files are intercepted by a malicous 3rd party, they should not be able to decrypt/read these files.
To do this, John creates a Private & Public key pair.
John keeps his Private key securely to himself.
John distributes his Public key to his customers.
John's customers then encrypt these files using John's Public key.
John's customers send these files to John via email.
Only John can decrypt these encrypted files because only he has the Private key
Example of Sign and Verify:
John's needs to send all his customers very important secret messages (in text files).
His customers need proof that these messages are indeed from John.
To do this, John creates a Private & Public key pair.
John keeps his Private key securely to himself.
John distributes his Public key to his customers.
John then signs his secret messages using his Private key.
John sends these signed messages via email to all his customers.
His customers use his Public key to verify (and decrypt) John's messages.