
- 86 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
About this book
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.
Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.
The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.
There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.
By reading this title readers will be provided with a step by step hands-on guide that includes:
- Simple descriptions of actual threat scenarios
- Simple, step-by-step instructions for securing data
- How to use open source, time-proven and peer-reviewed cryptographic software
- Easy to follow tips for safer computing
- Unbiased and platform-independent coverage of encryption tools and techniques
- Simple descriptions of actual threat scenarios
- Simple, step-by-step instructions for securing data
- How to use open source, time-proven and peer-reviewed cryptographic software
- Easy-to-follow tips for safer computing
- Unbiased and platform-independent coverage of encryption tools and techniques
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weāve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere ā even offline. Perfect for commutes or when youāre on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Simple Steps to Data Encryption by Peter Loshin in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.
Information
Chapter 1
Using Gnu Privacy Guard
Bob lives in Sylvania, a tiny nation ruled by a dictator who forbids all printed dissent and criticism. However, emboldened on a visit to the United States, Bob wrote his own brief editorial, on a cocktail napkin while sitting at the airport bar, waiting to board his plane home. It begins:
Free Sylvania!
Those two words alone could send Bob to the Sylvanian gulag if discovered back home. As the exhilaration of creation wears off, Bob downloads and installs Gnu Privacy Guard1 to encrypt his work. Heās been told itās good for encryption, and itās free, so why not?
Bobās plane leaves Logan in 15 minutes, and when he starts reading the tutorial for GnuPG, he panics: it goes on at great length about public key encryption and key pairs and generating key pairs and generating revocation certificates, and even when he gets to the part about encrypting a file, it says heāll need someone elseās public key to encrypt to. Bob quietly starts to freak out.
Fortunately for Bob, heās sitting next to a man who picks up on Bobās anxiety and offers to help. This good Samaritan is actually named Sam, and he just happens to know all about GnuPG. After they introduce themselves, Sam says, āListen Bob, I can help you get it all sorted out, donāt worry. Weāve even got time for a drink before they board your flight.ā
1.1 Keeping Data Secret, for a Novice GnuPG User
After seating themselves in the lounge, Sam says, āYouāre in a hurry and need to encrypt a file. Youāve just installed GnuPG but donāt know much about encryption, so your best bet is to use single-key encryption with a strong passphrase. Itās easy: all you need is GnuPG, no need to set anything up.ā
Sam explains, āUsing symmetric (secret) key encryption I can make sure no one can see the contents but me (and whoever I share the passphrase with). Thatās how Iād do it if I was in a hurry and didnāt have time to study tutorials or books.ā
Bob looks pointedly at his watch, then the departure board, but Sam continues, āSymmetric encryption is easy with GnuPG because I donāt need to generate my own public key pair or get anyone elseās key: I just enter an encryption command and enter a strong passphrase for my encrypted file. Are you ready?ā
1.2 The Simplest Example: GnuPG Symmetric Encrypting Text
Sam opens his laptop and a terminal window, and explains to Bob: āI think of GnuPG commands as if theyāre sentences; every GnuPG sentence starts with āgpgā, and there are grammar rules in this sentence like āoptions first, then filesā and āoptions before commandsā. You have to be careful to follow the grammar, but itās usually easy. Hereās how I encrypt a file called example.txt2,ā and he types:

āOh crud, what theā¦ā Sam, reading the GnuPG error messages onscreen after he hit <Enter>, realizes he misspelled the filename. āOops, thatās what you get when the filename doesnāt exist in the current directory; it happens all the time and isnāt a big deal. And if you get an error message that doesnāt make sense, you can usually get help by searching for that message on your favorite web search engine.ā Sam retypes the command and is prompted for a passphrase3 (twice):

āOK, I entered a passphrase, but now, nothing. Or is it?ā Sam says as he shows Bob a directory listing4 that includes a new file called example.txt.gpg. āWhen GnuPG creates new files, it names them by adding the .gpg extension.ā
Sam continued: āHereās my thinking when I enter that command. First, gpg=ārun GnuPGā. Then, -c, an abbreviation for the command --symmetric, for single-key encryption. If I used the -e option (--encrypt) that would be for doing public key encryption; Iāll show you public key encryption later, if you like.ā Sam sipped his drink.
āSo thatās my command: āGnuPG, encrypt something!ā. āSomethingā is whatever comes after the command, in this case a file called example.txt in the current directory5. I hit <Enter> and Iām prompted to enter a passphrase, and it should be something hard to crack. Good passphrases are hard to come up with, but they should be longer than 8ā10 characters at the very least, and should appear as random as possible, including upper and lower case letters, symbols and numbers. It will be hard to remember, but it will also be hard for someone to guess. Just remember that if you forget it, you wonāt be able to decrypt your file either.ā
Bob asks, āHow do I decrypt this file? Do I need GnuPG to decrypt?ā
1.3 Decrypting a File (Symmetric Key)
Sam said: āItās easy to decrypt a file, but you do need GnuPG (or compatible software6) to do it. Hereās how,ā Sam says as he types the command and hits <Enter>, entering a passphrase when prompted:

āSam, what does that WARNING mean?ā Bob asks. āOh, donāt worry about that: GnuPG can be a chatty little program, and not always completely clear. The first two lines mean the file was encrypted with the CAST5 algorithm--the default for GnuPG single-key encryption, with one passphrase. The last line means the file wasnāt digitally signed.ā
Sam continues: āThe messages tell you the file was encrypted successfully. GnuPG stored the decrypted file, named example.txt, to disk; now both files are in my directory. I didnāt have to explicitly say Iām decrypting (though I could have used the --decrypt option for clarity). Often you can just enter gpg <file_name> and GnuPG ādoes the right thingā with the file--if itās GnuPG compatible7, like if itās an encrypted file and you enter a valid passphrase. If you enter a file thatās not GnuPG compatible, youāll get an error, GnuPG wonāt assume you want to encrypt unless you tell it explicitly, with -c for symmetric encryption, or -e for public key.ā
Bob spoke up: āHang on, Sam, do I have to save it to a file? Iām not sure I want to save my secrets as plaintext on my hard drive.ā
Sam answers, āThatās a good point. Youād probably rather just use the --decrypt or -d command, because GnuPG sends its output directly to the standard output (thatās a fancy name for the terminal window, or console).ā He types a few lines, and says, āhereās what it looks like, Iām really just telling the computer: ārun GnuPG and decrypt (some file)ā ā:

Sam went on: āAfter I enter the passphrase, GnuPG prints the decrypted file out to the console--itās highlighted here, a 3-line text file. This is a simple way to decrypt files with GnuPG: just enter gpg -d <filename> (whatever the filename actually is); if the file can be decrypted GnuPG just splashes it out to the screen, no worries about having incriminating evidence saved on your disk, either.ā
As Bob peers at the screen, Sam goes on: āBob, you should know that when I have a plaintext file and I encrypt it, GnuPG creates a new file for the encrypted version (thatās what we call ciphertext) but nothing happens to the original plaintext file. Itās still sitting there, so you should securely erase8 the plaintext file, not just delete it, if youāre worried about someone finding it. Otherwise it could get you in trouble.ā
Bob says, āBut Iād rather not save a dangerous secret on my disk at all, ever; even if I delete it, it can still be recovered--canāt it?ā Sam answers, āYes, it often can be recovered, but there are ways to make it harderā¦ā when Bob interrupts: āIs there any way I can encrypt something without saving plaintext to the disk at all?ā
As the flight attendant announces āAll passengers attention. Now please board Sylvania Air Flight 789,ā over the intercom, the men finish their drinks and start packing up. āListen Bob,ā Sam says, āhereās my card: g...
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- To the Reader
- Preface. What Is This?
- Introduction
- Chapter 1. Using Gnu Privacy Guard
- Chapter 2. Selected FAQs on Using GnuPG
- Chapter 3. Public Keys
- Chapter 4. Public Key Functions
- Chapter 5. More About Signatures
- Chapter 6. Working with Public Keys
- Chapter 7. Editing and Revoking a Public Key
- Chapter 8. Security Practices and Tips
- Postscript