Can I use the same key pair generated on my windows environment in Linux Environment to decrypt?
Suppose I generate a key pair using python-gnupg in my windows environment and encrypt a file. Can I use the private key of this generated key in my Linux environment to decrypt the message?
PGP Encryption Key Usage
186 views Asked by loyala At
1
There are 1 answers
Related Questions in PYTHON
- new thread blocks main thread
- Extracting viewCount & SubscriberCount from YouTube API V3 for a given channel, where channelID does not equal userID
- Display images on Django Template Site
- Difference between list() and dict() with generators
- How can I serialize a numpy array while preserving matrix dimensions?
- Protractor did not run properly when using browser.wait, msg: "Wait timed out after XXXms"
- Why is my program adding int as string (4+7 = 47)?
- store numpy array in mysql
- how to omit the less frequent words from a dictionary in python?
- Update a text file with ( new words+ \n ) after the words is appended into a list
Related Questions in ENCRYPTION
- How to customize the output of the Postgres Pseudo Encrypt function?
- encrypted email with entrust certificate is not opening with MS Outlook
- Encrypting with Crypto Node.js and decrypt with window.crypto in Service-Worker
- How to decrypt identity section in web config?
- An exception of type 'System.Security.Cryptography.CryptographicException': keyset does not exist
- IBM DB2 native encryption applied on live database
- crypto.BadPaddingException: data hash wrong (EKYC-Response)
- searchable row level encryption using java?
- AES 256 and Base64 Encrypted string works on iOS 8 but truncated on iOS 7
- Decrypted string returns "Length of the data to decrypt is invalid"
Related Questions in PUBLIC-KEY-ENCRYPTION
- Storing Encryption Key in Application
- Original Base64 value is edited but still it is giving same normal string
- Verify a file signature inside a Linux kernel module
- Retrieve ECC Public Key from Base64 encoded string
- What format are .tox files stored in?
- How Restful Request Public Key and Private Key Works for each request
- Use previously generated private key in ECIES
- How to create valid public and private key for digital sign?
- I am getting error while using SecKeyEncrypt with Secure Enclave
- How can you asymmetrically encrypt a key using ECC in Java?
Related Questions in PGP
- How to verify the integrity of a linux tarball?
- C# .net core encryption
- PGP Encryption Hanging From SQL
- When is key signing necessary?
- What is the command line equivalent for "sign, armor and encrypt" using GPA - PGP?
- Exception with CreateKey of PublicKeyFactory of BouncyCastle
- RSA / DSA implementation in the Forth language
- java.lang.OutOfMemoryError when processing large pgp file
- Golang pgp without secring
- Is it safe to rename file encrypted using gpg public key?
Related Questions in PYTHON-GNUPGP
- I got error "TypeError: __init__() got an unexpected keyword argument 'gnupghome'" once trying to use Python encryption with GnuPG
- Python GnuPG decryption succeeds on Windows but fails on Linux
- gnupg fingerprint not identified as valid recipient for encryption
- How to Python gnupg (GPG) encrypt with recipient's email address rather than their fingerprint?
- Create PGP signed message with EmailMessage class
- How to properly decrypt PGP encrypted file in a AWS Lambda function in Python?
- Is there a way to decrypt an encrypted file using Python libraries?
- Calling GPG method from AWS serverless
- Openpgp: Using python wrapper python-gnupg 'error - sign-encrypt 17' - Error only when signing
- PGP Encryption Key Usage
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Popular Tags
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
The real question here is how can you securely transfer your private key from one system to another? If you have a secure means of file transfer, you could probably use it for the main file instead of just for the key, and an extra layer of encryption is probably unnecessary.
If you cannot securely transfer any files, then you shouldn't send any plaintext or secret keys between systems. Fortunately, this is a situation where public key encryption shows its strengths. You can create two separate key pairs, one for each system. You only need to have each system send the other the public key of the key pair, the private keys are never taken off the system they were created on. You don't care if an attacker is able to get a copy of those public keys, indeed, some public keys are published on the internet!
When you have a file you want to securely send from one system to another, you use the public key for the recipient to do the encryption. The sender may also want to sign the file with its own private key (so the integrity of the file can be verified at the other end). The encrypted (and signed) file can then be transported by less secure means from one system to the other, without too much fear of an attacker getting a copy, since it will be very hard for that attacker to crack the encryption. The recipient can decrypt the file using their secret key (and verify the signature using the public key of the sender).