How To Install GPGWin & Kleopatra To Encrypt\Decrypt A File

Kleopatra is a certificate manager and GUnI for GnuPG. The software stores your OpenPGP certificates and keys, in addition to this you can use this software to encrypt emails and files.

In this video, Nick will take you through the steps to deploy the software and then create a private\public keypair. AS part of this demonstration Nick will show you how to use your public key to encrypt a file and then decrypt that file with the use of your private key. As the last step, Nick will also show you how to back up your private key.

Prerequisites include: Download GPGWin from (Version 3.1.5 used in this demo) Windows 10 or Windows 2012\2016 server to deploy software onto.

Hello and Welcome to this video where I'm going to show you how to install GPGwin and Kleopatra to encrypt and decrypt files so the first step is to install GPG for windows. So we'll select OK. Then we’ll click next so the next options are to select the components that you want to install so by default privacy. Guard is installed. We're going to select Kleopatra that's the key manager. We also have an outlook extension, you have a shell extension and a browser extension for the moment. We’ll just go for the defaults will click next. So now that's installed we will just leave the option checked for run Kleopatra. So now that Kleopatra is running we can create our key pair to do that. We select file and we select new key pair in this demonstration. We're going to create an open PGP keypair you can also use X 509. Key pairs as well. So we have to add our name and our email address. And then we click advanced settings now in these advanced settings, you get the option for setting your level of encryption. So we're going to use 2048 bets. You can go up as far as 4096. So I will leave it at the default. You should be aware that if you select 4096. Some applications don't yet support. That level of encryption. It will also use more processor time as well. We will leave it valid until 28/12/2020, so that's valid for one year and we're going to be using the usage will be for signing. And we can review how a key pair will be created. And then we click on create now were prompted for a pass phrase to protect the key. And that is the key pair created so the next step is to make a backup of key pair. This is advised so if anything happens or if it’s corrupted that you can restore it. And we'll just call that backup GPG. We'll leave ASCII armor unchecked at the moment. The reasoning behind ASCII armor for PGP is that the original PGP. format is binary which is not considered very readable by some of the most common messaging formats. So we'll just leave in binary format at the moment. OK so we've now got a backup of our key pair. So we'll click finish. So now you have the ability to send your public key to another user or organization, so that they can encrypt using your public key when you receive the file on your server or laptop. Then you have the ability to decrypt as you have the corresponding private key so we'll just do an example. We will select sign and encrypt. And on my desktop I have a file called my secret file dot TXT. So I'm going to sign it with the key pair I've created the private key. We're going to encrypt for myself. We can actually add a name on an email address that we want to send to and we can select to encrypt with password. This would also mean that we have to share the password as well. So we will just click on sign and encrypt. Were prompted for our passphrase? And that succeeded so now you see from our original file. We have the text. This is a test and are encrypted file if we open this up. With notepad you'll see. How it's been encrypted? So if you had received this file, which had been signed using your public key you can then use decrypt and verify. To unencrypt the file. So we can click on save all. Now it's prompting me to overwrite my original file on my desktop we’ll just do that This time just so we can see the contents. And there, you'll see this is a test. Thank you for watching this video.