gpg -d file.txt.gpg -o file.txt

decrypt file.txt.gpg using my private key


-4
By: kev
2011-09-17 05:04:59

These Might Interest You

  • gpg command to decrypt a previously encrypted file on the command line. Can be optionally made into an alias: alias decrypt='gpg --output foo.txt --decrypt foo.txt.pgp'


    5
    gpg --output foo.txt --decrypt foo.txt.pgp
    mariusz · 2009-02-16 19:56:19 2
  • Decrypt MD5 , replace 1cb251ec0d568de6a929b520c4aed8d1 with the MD5 string you want to decrypt Show Sample Output


    1
    wget -qO - --post-data "data[Row][cripted]=1cb251ec0d568de6a929b520c4aed8d1" http://md5-decrypter.com/ | grep -A1 "Decrypted text" | tail -n1 | cut -d '"' -f3 | sed 's/>//g; s/<\/b//g'
    samhagin · 2011-10-13 03:48:54 0
  • This will create, in the current directory, a file called 'pk.pem' containing an unencrypted 2048-bit RSA private key and a file called 'cert.pem' containing a certificate signed by 'pk.pem'. The private key file will have mode 600. !!ATTENTION!! ==> this command will overwrite both files if present.


    1
    touch pk.pem && chmod 600 pk.pem && openssl genrsa -out pk.pem 2048 && openssl req -new -batch -key pk.pem | openssl x509 -req -days 365 -signkey pk.pem -out cert.pem
    bfreis · 2011-05-11 18:09:33 0
  • Need to encrypt something from the command line? I've used this before to encrypt passwords with a master password that was shared amongst a team. To decrypt: ~$ echo -n 'jA0EAwMCPdknsznAww5gySL1/quqhXg6QgQkIz5abzGP5EZgTbXCFU+y6dP8ySWovytc' | base64 --decode | gpg --decrypt gpg: CAST5 encrypted data Enter passphrase: secret gpg: encrypted with 1 passphrase HelloWorld! Show Sample Output


    0
    echo 'HelloWorld!' | gpg --symmetric | base64
    ryanchapman · 2013-07-06 08:30:35 0
  • If on a web server (with access to the ssl key), decrypt SSL off the wire


    0
    openssl pkcs8 -in /etc/pki/tls/web.key -out /root/wc.key -nocrypt && tshark -o "ssl.desegment_ssl_records:TRUE" -o "ssl.desegment_ssl_application_data:TRUE" -o "ssl.keys_list:,443,http,/root/wc.key" -o "ssl.debug_file:rsa.log" -R "(tcp.port eq 443)"
    ryanchapman · 2013-07-06 08:01:36 0
  • Change directory (cd) to the directory where all your encrypted files are placed, and then run the command - then you are asked to insert your secret gpg password - ubuntu 8.04


    1
    gpg --allow-multiple-messages --decrypt-files *
    bkn390 · 2009-09-20 11:50:41 0

What Others Think

Try to be more creative. This site is about the individual console wisdom. I suppose we all have ''man'' if we want to read how to use a command properly. In this case, ''man gpg'' will cover all of your recently posted commands. Good luck next time.
RanyAlbeg · 348 weeks and 4 days ago
@RanyAlbeg. Do you spend a lot of time reading every manpage? I just want to let people know there is a helpful command called `gpg`! If people found `gpg` is really helpful, then they will read `manpage`!
kev · 348 weeks and 3 days ago
I say, if someone wants to use encryption he will look for the right tool to do so. You know, something like Google "encryption CLI tool linux" You are trying to contribute, and it is a good thing but I'm not sure if this is the right place for your kind of commands. Maybe try to use gpg in a more complex way to achieve time saving or accomplish a common task that we all need to deal with in our everyday terminal usage. Post one-liners that are useful and based on your terminal experience. To me, this site is more about tricks and interesting ways to solve certain problems in a clever way. You just gave us some usage examples of gpg. Thank you and good luck next time :)
RanyAlbeg · 348 weeks and 3 days ago

What do you think?

Any thoughts on this command? Does it work on your machine? Can you do the same thing with only 14 characters?

You must be signed in to comment.

What's this?

commandlinefu.com is the place to record those command-line gems that you return to again and again. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.

Share Your Commands



Stay in the loop…

Follow the Tweets.

Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.

» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10

Subscribe to the feeds.

Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):

Subscribe to the feed for: