diff options
Diffstat (limited to '')
-rw-r--r-- | src/content/docs/guides/text-opetations.md | 59 |
1 files changed, 13 insertions, 46 deletions
diff --git a/src/content/docs/guides/text-opetations.md b/src/content/docs/guides/text-opetations.md index e753fa6..9018b5b 100644 --- a/src/content/docs/guides/text-opetations.md +++ b/src/content/docs/guides/text-opetations.md @@ -10,9 +10,12 @@ core cryptographic operations: **encryption**, **decryption**, **signing**, and cryptography and provides intuitive workflows for both beginners and advanced users. + + ## Understanding the Basics Public key cryptography relies on key pairs: + - **Public Key**: Used to encrypt or verify. - **Private Key**: Used to decrypt or sign. @@ -21,8 +24,8 @@ own key pair and exchange public keys with their communication partners. ## Encrypting Text -### Only Encrypt Use the recipient's **public key** to encrypt plaintext. This method: + - Produces a shorter ciphertext. - Does **not** reveal the sender's identity. - Is ideal when anonymity is preferred. @@ -30,82 +33,46 @@ Use the recipient's **public key** to encrypt plaintext. This method: > 🔐 Tip: Don’t use your own public key to encrypt unless you're sending a > message to yourself. - - -### Encrypt & Sign -This method encrypts the message with the recipient's public key and signs it -with **your own private key**, ensuring: -- Confidentiality -- Message authenticity -- Proof of origin - -To use this method: -- Choose the recipient’s public key. -- Select **your private key** with signing capability (`Usage = S`). - -> 📄 The resulting ciphertext is longer due to the signature. The Info Board -> will display signature details after encryption. - - + ## Signing Text -### Signature Only Use your **private key** to sign text without encrypting it: + - This confirms authorship. - Anyone with your public key can verify it. Check the key’s `Usage` column for `S` to confirm it's suitable for signing. - - -### Sign with Encryption -Sign and encrypt together by selecting the recipient's public key and your own -private signing key: -- Ensures both confidentiality and authenticity. -- Common in secure messaging or business communication. - - - ---- + ## Decrypting Text -### Decrypt Only Paste or load the ciphertext into GpgFrontend. The tool will: + - Automatically use the correct **private key**. - Notify you if no valid key is available. > ✅ No need to check `Usage` manually; the tool handles key matching. - - -### Decrypt & Verify -If the message was signed, GpgFrontend will: -- Verify the signature using the **sender’s public key**. -- Display whether the signature is valid. - -Use this for added assurance of sender authenticity and message integrity. - - - ---- + ## Verifying Signatures To verify a detached or embedded signature: + - Use the sender’s **public key**. - Paste or load the signed message. GpgFrontend will: + - Check the integrity. - Report any mismatch or missing public keys. > 📥 If the required public key is missing, GpgFrontend prompts you to import > it. - + ## Best Practices @@ -113,4 +80,4 @@ GpgFrontend will: - Share only your **public key**, and **never** your private key. - Use **Encrypt & Sign** for secure and authenticated communication. - Use **Sign Only** for publishing documents or messages that require integrity - but not secrecy.
\ No newline at end of file + but not secrecy. |