Okay… on this blog post, we explained the finer details of GNU Privacy Guard or GPG or GnuPG or PGP. Activities that are required to be performed were explained in detail with the commands to perform them.
However, you would still not be able to connect the dots, without this grand overview of GNU Privacy Guard and how it works. The below diagram shows how you can work with GnuPG or GNU Privacy Guard or GPG or PGP over the life-cycle of your keys.
The GNU Privacy Guard Cycle (Click on the boxes for more information)
Blue boxes represent routine usage operations.
Below is the list of steps
1 Generate key How to create a GNU Privacy Guard (GPG) GnuPG key pair 2 List keys 2.1 List Public Key How to list GnuPG or GPG public keys 2.2 List Private Key How to list GnuPG or GPG secret keys 3 Export and Backup Keys 3.1 Export Public Key How to export your public key to an ASCII / text file 3.2 Export Private Key How to export your private key to an ASCII / text file 3.3 Create Revocation Certificate How to generate a revocation certificate 4 Send public key to key server How to send GPG public key to a PGP key server 5 Import others public keys How to import GnuPG / PGP public keys from a key server 7 Use keys 7.1 Use keys in Evolution on Linux How to add/use GnuPG / GPG key ID in Evolution email client 7.2 Use keys in K-9 and APG on Android K-9 eMail client for Android and APG for GPG (PGP) 7.3 Use keys in Thunderbird email client 8 Revoke keys How to revoke a GnuPG / GPG key in Linux