--- title: Encrypt & Sign File --- GpgFrontend offers a fast and convenient method for working with files. The encryption and decryption process for files is nearly identical to that of text, with the exception that file operations involve binary input and output. ## File Extension Introduction For ciphertext in ASCII format, the file extension is typically "asc" and these files can be opened with a text editor. On the other hand, if the ciphertext is in binary format, the file extension will be "gpg". Binary ciphertext files are generally smaller than ASCII format. Before version 2.0.4, GpgFrontend generated ciphertext files exclusively in ASCII format. However, beginning with version 2.0.4, GpgFrontend now generates ciphertext files in binary format by default. This setting can be adjusted in the program's settings. ![image-20220112073548736](https://image.cdn.bktus.com/i/2023/11/16/980bff72-7271-b639-e63b-ff1d274edc95.webp) ## File Browser From the top menu's "File" option, you can access the file browser by pressing Ctrl/Command + B. After choosing target directory at system navigator, you can then use the file browser tab to do some operations on files. By using the file browser, you can navigate to your working directory and right-click on the file you wish to work with. This will open a pop-up menu, where you can select the operation you want to perform on the file. ![image-20220112072034647](https://image.cdn.bktus.com/i/2023/11/16/6a137a63-ae76-d45c-b425-5c3e5961aa2d.webp) Located at the top of the file tab are two control buttons. The button on the left allows you to navigate up one level in the directory hierarchy, while the button on the right refreshes the input box on the left with the corresponding path. On the far right of the file tab, there is a button with useful options that you can select to show system files or hidden files. ![image-20220112072335503](https://image.cdn.bktus.com/i/2023/11/16/1cc208dc-75f7-6e1f-f802-149ed18095af.webp) ### Encrypt & Sign GpgFrontend recommends using the encryption and signature functions in this method, so that the recipient can verify that the ciphertext originates from you. You can select one or more recipients' public keys as well as your own private key to complete this operation. When the operation is complete, a file with the ".gpg" extension is generated. This file contains both encrypted content and signed content. ![Peek 2022-01-12 07-26](https://image.cdn.bktus.com/i/2023/11/16/e7b1cf22-483d-91a4-e1d1-475ba10c51ad.gif) ### Decrypt & Verify When decrypting this ciphertext, it undergoes verification, which enhances security. Additionally, you can perform a "Only Verify" operation which verifies the content without decrypting it. To use this operation, you must select a file with a ".gpg" or ".asc" extension, which contains the ciphertext and signature content. To encourage users to verify whether the ciphertext is signed or not when decrypting, Gpg Frontend does not provide a separate decryption operation for this. ![Peek 2022-01-12 07-24](https://image.cdn.bktus.com/i/2023/11/16/bf3cca62-d28a-83bd-8676-7cb1bcf94f4c.gif)