PGP/GPG Encryption & Decryption Guide | GnuPG Tutorial
Learn how to encrypt and decrypt with PGP/GPG in this comprehensive tutorial. Enhance your cryptography skills 🔒. Check out my Udemy course!

Sridhar Iyer
11.5K views • Mar 21, 2020

About this video
Do Check out my Udemy Course on System Security and Digital Forensics :
https://www.udemy.com/course/beginner-course-in-system-security-digital-forensics/
Drop a comment in the comment section for free membership vouchers
INTRODUCTION ABOUT PGP / GPG :
PGP stands for Pretty Good Privacy. It was created in the 1990s and is currently owned by security software company Symantec. Over the course of nearly three decades, PGP has been developed, improved, and updated, making it the standard option for file encryption today.
PGP uses several encryption technologies, like hashing, data compression, and public/private PGP keys to protect an organization’s critical information (i.e., the company’s crown jewels). While it’s often used to encrypt files before exchanging them with trading partners or remote locations, PGP can also encrypt emails, directories, and disk partitions, so it's a fitting solution for modern cybersecurity needs.
What about Open PGP?
PGP is the backbone of Open PGP, which is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open-source PGP encryption technology.
ABOUT THE EXPERIMENT :
In this video I will show you how to create an Encryption System to secure message communication between two entities.
Click Below to Download the Resource File:
https://iyersridhar.com/css-resources/
MY OTHER PLAYLISTS:
1. Cryptography and System Security :
https://www.youtube.com/playlist?list=PLx2aAxxVN1NV-cQTrfm1XnWU1rDrN3QsJ
2. Advanced System Security and Digital Forensics
https://www.youtube.com/playlist?list=PLx2aAxxVN1NVk9JwAQwCNA159FrSXQ5Hn
3. Theory of Computer Science
https://www.youtube.com/playlist?list=PLx2aAxxVN1NXhbYJtEWSk8MGS9GLJDMrl
https://www.udemy.com/course/beginner-course-in-system-security-digital-forensics/
Drop a comment in the comment section for free membership vouchers
INTRODUCTION ABOUT PGP / GPG :
PGP stands for Pretty Good Privacy. It was created in the 1990s and is currently owned by security software company Symantec. Over the course of nearly three decades, PGP has been developed, improved, and updated, making it the standard option for file encryption today.
PGP uses several encryption technologies, like hashing, data compression, and public/private PGP keys to protect an organization’s critical information (i.e., the company’s crown jewels). While it’s often used to encrypt files before exchanging them with trading partners or remote locations, PGP can also encrypt emails, directories, and disk partitions, so it's a fitting solution for modern cybersecurity needs.
What about Open PGP?
PGP is the backbone of Open PGP, which is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open-source PGP encryption technology.
ABOUT THE EXPERIMENT :
In this video I will show you how to create an Encryption System to secure message communication between two entities.
Click Below to Download the Resource File:
https://iyersridhar.com/css-resources/
MY OTHER PLAYLISTS:
1. Cryptography and System Security :
https://www.youtube.com/playlist?list=PLx2aAxxVN1NV-cQTrfm1XnWU1rDrN3QsJ
2. Advanced System Security and Digital Forensics
https://www.youtube.com/playlist?list=PLx2aAxxVN1NVk9JwAQwCNA159FrSXQ5Hn
3. Theory of Computer Science
https://www.youtube.com/playlist?list=PLx2aAxxVN1NXhbYJtEWSk8MGS9GLJDMrl
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
11.5K
Likes
141
Duration
17:21
Published
Mar 21, 2020
User Reviews
4.4
(2) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.