Gnu Privacy Guard (GnuPG) Mini Howto (English) <author>Brenno J.S.A.A.F. de Winter (English) <tt><brenno@dewinter.com></tt> Michael Fischer v. Mollard (German) <tt><fischer@math.uni-goettingen.de></tt> Arjen Baart <tt><arjen@andromeda.nl></tt> <date>Version 0.1.4 August 10, 2004 <abstract> This documents explains how to use the GNU Privacy Guard (GnuPG), an Open Source OpenPGP compatible encryption system To keep this program totally free the use of the RSA algorithm and other patented algorithm has been avoided. The document was originally written by Michael Fischer v. Mollar in German. The text has been translated and adjusted on some points and cannot be considered as a full one-on-one copy. </abstract> <toc> <sect>Concepts<label id="GPG-Minihowto-Concept"> <p> <#if output=latex2e> <em><bf>Remark for printed versions:</bf> Due to technical difficulties the double hyphen, which indicates the long options of GnuPG, in text embedded in paragraphs are represented individually as single hyphens. So please read double hyphens with long options. </em> </#if> </p> <sect1>Public Key Encryption <p> Classic methods for encryption only use one key for encryption. The sender encrypts the message with this key. To be able to decrypt this the receiver needs to have this very same key. This key must have been given to the receiver in a way, that others won't have had the opportunity to obtain this key. If somebody else does have the key, this method of encryption is useless. <p> The use of so-called Public Keys can solve this problem. Public Keys is a concept where two keys are involved. One key is a Public Key that can be spread through all sorts of media and may be obtained by anyone. The other key is the Private Key. This key is secret and cannot be spread. This key is only available to the owner. When the system is well implemented the secret key cannot be derived from the public key. Now the sender will crypt the message with the public key belonging to the receiver. Then decryption will be done with the secret key of the receiver. <p> Crucial in this concept is that the secret key remains a secret and should not be given away or become available to anyone else but the owner of this key. YOU CANNOT SEND THIS KEY OVER THE INTERNET. Also it is very unwise to use GnuPG over <tt>telnet</tt> (you might consider never to use telnet based on the high security risks). <sect1>Digital Signatures <p> In order to prove that a message was really sent by the alleged sender the concept of Digital Signatures was invented. As the name says a message is digitally signed by the sender. By using this signature you can check the authenticity of a message. Using this will reduce the risk for Trojan horses (a message that claims to be a patch to a certain problem but actually contains a virus or does something bad with data on your computer). Also information or data can be verified as coming from a legitimate source and thus be regarded as real. <p> A digital signature is made through a combination of the secret key and the text. Using the senders public key the message can be verified. Not only will be checked if the correct sender is involved, also the content will be checked. So you know that the message comes from the sender and has not been changed during the transportation process. <sect1>Web of trust <p> A weak point of the Public key algorithms is the spreading of the public keys. A user could bring a public key with false user ID in circulation. If with this particular key messages are made, the intruder can decode and read the messages. If the intruder passes it on then still with a genuine public key coded to the actual recipient, this attack is not noticeable. <p> The PGP solution (and because of that automatically the GnuPG solution) exists in signing codes. A public key can be signed by other people. This signature acknowledges that the key used by the UID (User Identification) actually belongs to the person it claims to be. It is then up to the user of GnuPG how far the trust in the signature goes. You can consider a key as trustworthy when you trust the sender of the key and you know for sure that the key really belongs to that person. Only when you can trust the key of the signer, you can trust the signature. To be absolutely positive that the key is correct you have to compare the finger print over reliable channels before giving absolute trust. <sect1>Boundaries to security <p> If you have data that you would like to remain confidential, there is more to it than just determining which encoding algorithm to use. You should be thinking about your system security in general. Basically we consider PGP to be secure and as I write this documents no incidents of PGP being cracked are known to me. But that doesn't mean that all encoding must be safe then (for instance the NSA wouldn't notify me if they cracked PGP somehow, neither would other people who crack for real malicious grounds). But even if the PGP is fully 'unhackable', other means can be used to attack the security. Early February 1999 a Trojan Horse had been found that searched for secret PGP keys on the hard disk and FTP-ed them away. If the password has been chosen badly the secret key can easily be cracked. <p> Another technical possibility (although more difficult) is a Trojan Horse that broadcasts keyboard entries. Also possible (but very difficult) is to pass the content of a screen along. Then no cracking of scrambled messages needs to be done. For all these risks there need to be a good, well-thought security plan that is actually deployed. <p> It is not a goal to create paranoia among people, but to point out that a lot needs to be done to be more secure. The most important thing is to realize that encryption is just one step to security and is not a total solution. Trojan horses as they appeared in the Melissa virus in March 1999 proved that many companies are not prepared for that. <sect>Installation <p> <sect1>Sources for GnuPG. <p> The official download site is: <url url="http://www.gnupg.org/download.html" name="GnuPG Homepage">. At that location you will find links to mirror sites. Due to legal restrictions it is not allowed to download GnuPG from servers based in the USA. The USA imposes export restrictions on the export of cryptographic software. This is why PGP is always available in an international and a national (for the USA) version. For the international version the source code has been exported in a printed format as a book. In Europe (Oslo) it has been scanned. More information on that can be found on <url url="http://www.pgpi.com" name="International PGP Homepage">. The international version of PGP is free to be imported into the United States as long as it is not reexported again. <p> If you already have an installed version of GnuPG or PGP, you should check the signature of the file (see <ref id="GPG-Minihowto-signatures" name="Signatures">). <sect1>Configuration <p> You can obtain GnuPG as a Debian Package, as a RPM package (Redhat Package Manager) or in source code. GnuPG is included in the latest Fedora/Redhat Linux distributions. To check if you have GnuPG installed on your system, use: <tscreen><verb>rpm -q gnupg</verb></tscreen> The packages are installed as binary files with the tools needed for Linux platforms. When you need GnuPG for different platforms you need to compile this yourself. It would be appreciated when you make alternative installation methods for different platforms available to the general public. <p> Since development for the major part takes place with Linux (x86), translation to different systems should not be regarded as being a problem. The actual list of known operating systems that support GnuPG can be found on <htmlurl url="http://www.gnupg.org" name="GnuPG Homepage">. The procedure as described below is pretty platform independent. This procedure can be used to install GnuPG out of a source code tar-ball. <p> Unpack the tar-ball with the following commands, For sources compressed with gzip use: <tscreen><verb>tar xvzf gnupg-?.?.?.tar.gz</verb></tscreen> and for sources compressed with bzip2 use: <tscreen><verb>tar xvjf gnupg-?.?.?.tar.bz2</verb></tscreen> After the unpack, please step into the directory containing the source code. Then type <tscreen><verb>./configure</verb></tscreen> When doing this nothing special should happen. With <tscreen><verb>./configure --help</verb></tscreen> you can view the available configuration settings for compilation. If problems occur that have to do with internationalization (gettext), you can include a version that is delivered with the source code by using the option <tt>--with-included-gettext</tt> or switch it of by using the <tt>--disable-NLS</tt> option. <sect1>Compile <p> After this we want to compile the stuff by typing: <tscreen><verb>make</verb></tscreen> This should work without any problems. If any problems occur take the following steps (in the same order as described here): First try to solve this yourself (of course also by using the available documentation). Then make sure that your problem is not a known bug (check the BUGS file on http://www.gnupg.org). Then ask someone you know. If these steps do not solve your problem post a question to the GnuPG-mailing list (see <ref id="GPG-Minihowto-Informationsources" name="Informationsources">). If the problem is path related, you should try <tt>make clean</tt>, then run <tt>configure</tt> again and retry to compile. If that doesn't work it is time to panic. <sect1>Installation <p> Now type: <tscreen><verb>make install</verb></tscreen> to actually copy the program and the man-pages into the installation directory. If you didn't change the installation directory when you did ./configure the <tt>usr/local/share/gnupg/</tt> will be the installation directory. You can find this directory in the file <tt>options.skel</tt>. When you change this <tt>options.skel</tt>. If you copy this to <tt>~/.gnupg/options</tt> the appropriate adjustments will be used as standard. Copying should occur automatically when creating <tt>~/.gnupg/</tt>. All possible options are well documented and explaining them here would not be useful. <p> You can run GnuPG as suid root. So the program runs with all the rights the superuser has. By doing this you exclude the possibility that certain parts of the program are stored externally and then could be read by anyone. It is not feasible for me to judge on the value of this risk. But running the program as suid root one should be alert to the danger of Trojan horses. Since a Trojan horse running as superuser can damage an entire system. If for this reason (or any other reason) you choose not run GnuPG as root you can switch off the warning by setting <tt>no-secmem-warning</tt> in <tt>~/.gnupg/options</tt>. <sect>Using keys<label id="GPG-Minihowto-Key"> <p> <sect1>Creating a key <p> With <tscreen><verb>gpg --gen-key</verb></tscreen> a new key-pair is created (key pair: secret and public key). The first question is which algorithm can be used. You can read more about algorithms in <url url="http://www.samsimpson.com/cryptography/pgp/pgpfaq.html" name="PGP DH vs. RSA FAQ"> or in <ref id="BSchneier" name="Applied Cryptography">. <!-- or in http://www.scramdisk.clara.net/pgpfaq.html --> You can easily (and maybe you should - since it is used so widely) use DSA/ ElGamal. This is not patented. <p> The next question is key length. This is something that is very user dependent. You need to choose between security and calculating time. If a key is longer the risk for cracking the message when intercepted decreases. But with a larger key calculation time also increases. If computing time is an issue you still should consider that you want to use the key for sometime. We all know that arithmetic performance increases very quickly, since new processors are getting quicker and quicker. So keep this in mind. The minimal key length GnuPG demands is 768 bits. However some people say you should have at a key-size of 2048 bits (which is also really a maximum with GnuPG at this moment). For DSA 1024 is a standard size. When security is a top priority and performance is less an issue you ought to pick the largest key-size available. <p> The system now asks to enter names, comment and e-mail address. Based upon the entries here the code is calculated. You can change these settings later. See <ref id="GPG-Minihowto-KPAdministration" name="Administering keypairs">. <p> Finally you have to enter a password (actually passphrase would be more appropriate, since blanks are allowed). This password is used to be able to use the functionality which belongs to your secret key. A good passphrase contains the following elements: <itemize> <item>it is long, <item>it has special (non alphanumeric) characters, <item>it is something special (not a name), <item>it is very hard to guess (so NOT names, birth dates, phone numbers, number of a credit card/checking account, names and number of children, ...) </itemize> By sometimes using CaPItaLs aNd SOMEtimes NoT you can build in further security. When you make your password make sure that you WILL NOT FORGET it. Since if you do messages are not legible and the use of your secret key has gone. It might be wise to generate some kind of a certificate containing this information (of course be careful that nobody gets to your passphrase). See <ref id="GPG-Minihowto-Revoke" name="Revoke">. <p> After everything was entered the systems starts generating the keys. This will take some time. During that time it needs to collect a lot of random data. By working in a different screen you can help the system collecting changing random data. As you understand by now, the key will be always different. If you generate a key now and 5 minutes later with exactly the same data, you'll get two different keys. Now you must understand why you shouldn't forget your password. <sect1>Exporting keys <p> The command for exporting a key for a user is: <tscreen><verb>gpg --export [UID]</verb></tscreen> If no UID has been submitted all present keys will be exported. By default the output is set to <tt>stdout</tt>. But with the <tt>-o</tt> option this is sent to a file. It may be advisable using the option <tt>-a</tt> to write the key to a 7-bit ASCII file instead of a binary file. <p> By exporting public keys you can broaden your horizon. Others can start contacting you securely. This can be done by publishing it on your homepage, by finger, through a key server like http://www.pca.dfn.de/dfnpca/pgpkserv/ or any other method you can think of. <sect1>Importing keys <p> When you received someone's public key (or several public keys) you have to add them to your key database in order to be able to use them. To import into the database the command looks like this: <tscreen><verb>gpg --import [Filename]</verb></tscreen> if the filename is omitted the data will be read from <tt>stdin</tt>. <sect1>Revoke a key<label id="GPG-Minihowto-Revoke"> <p> For several reasons you may want to revoke an existing key. For instance: the secret key has been stolen or became available to the wrong people, the UID has been changed, the key is not large enough anymore, etc. In all these cases the command to revoke the key is: <tscreen><verb>gpg --gen-revoke</verb></tscreen> This creates a revocation certificate. <em>To be able to do this, you need a secret key </em>, else anyone could revoke your certificate. This has one disadvantage. If I do not know the passphrase the key has become useless. But I cannot revoke the key! To overcome this problem it is wise to create a revoke license when you create a key pair. And if you do so, keep it safe! This can be on disk, paper, etc. Make sure that this certificate will not fall into wrong hands!!!! If you don't someone else can issue the revoke certificate for your key and make it useless. <sect1>Key administration<label id="GPG-Minihowto-KPAdministration"> <p> With the GnuPG system comes a file that acts as some kind of database. In this file all data regarding keys with the information that comes with the keys is stored (everything until the Ownertrust values: for more information on that read <ref id="GPG-Minihowto-KSigning" name="Key signing">). With <tscreen><verb>gpg --list-keys</verb></tscreen> all present keys will be displayed. To see the signatures as well type: <tscreen><verb> gpg --list-sigs </verb></tscreen> (see <ref id="GPG-Minihowto-KSigning" name="Key signing"> for further information). To see the fingerprints type: <tscreen><verb>gpg --fingerprint </verb></tscreen> You want to see "Fingerprints" to ensure that somebody is really the person they claim (like in a telephone call). This command will result in a list of relatively small numbers. To list the secret keys you type: <tscreen><verb>gpg --list-secret-keys</verb></tscreen> Note that listing fingerprints and signatures from private keys has no use what soever. <p> In order to delete a public key you type: <tscreen><verb>gpg --delete-key UID </verb></tscreen> For deleting a secrete key you type: <tscreen><verb> gpg --delete-secret-key </verb></tscreen> <p> There is one more important command that is relevant for working with keys. <tscreen><verb>gpg --edit-key UID</verb></tscreen> Using this you can edit (among other things) the expiration date, add a fingerprint and sing your key. Although it is too logic to mention. For this you need your passphrase. When entering this you will see a command line. <sect1>Key signing<label id="GPG-Minihowto-KSigning"> <p> As mentioned before in the introduction there is one major Achilles' heel in the system. This is the authenticity of public keys. If you have a wrong public key you can say bye bye to the value of your encryption. To overcome such risks there is a possibility of signing keys. In that case you place your signature over the key, so that you are absolutely positive that this key is valid. This leads to the situation where the signature acknowledges that the user ID mentioned in the key is actually the owner of that key. With that reassurance you can start encrypting. <p> Using the <tt>gpg --edit-key UID</tt> command for the key that needs to be signed you can sign it with the <tt>sign</tt> command. <p> <em>You should only sign a key as being authentic when you are ABSOLUTELY SURE that the key is really authentic!!!</em>. So if you are positive you got the key yourself (like on a key signing party) or you got the key through other means and checked it (for instance by phone) using the fingerprint-mechanism. You should never sign a key based on any assumption. <p> Based on the available signatures and "ownertrusts" GnuPG determines the validity of keys. Ownertrust is a value that the owner of a key uses to determine the level of trust for a certain key. The values are <itemize> <item> 1 = Don't know <item> 2 = I do NOT trust <item> 3 = I trust marginally <item> 4 = I trust fully </itemize> If the user does not trust a signature it can say so and thus disregard the signature. Trust information is not stored in the same file as the keys, but in a separate file. <sect>Encrypt and decrypt<label id="GPG-Minihowto-encrypt"> <p> After installing everything and configuring everything in the way we want, we can start on encrypting and decrypting. <p> When encrypting or decrypting it is possible to have more than one private key in use. If this occurs you need to select the active key. This can be done by using the option <tt>-u UID</tt> or by using the option <tt> --local-user UID</tt>. This causes the default key to use to be replaced by wanted key. <p> If you want to change recipient this can be done by the option <tt>-r</tt> or by the option <tt>--recipient</tt>. <sect1>Encrypt <p> The command to encrypt is <tscreen><verb>gpg -e Recipient [Data]</verb></tscreen> or <tscreen><verb>gpg --encrypt Recipient [Data]</verb></tscreen> To avoid the risk that somebody else claims to be you, it is very useful to sign everything you encrypt, see <ref id="GPG-Minihowto-signatures" name="signatures">. <sect1>Decrypt <p>The command for decrypting is: <tscreen><verb>gpg [-d] [Data] </verb></tscreen> or <tscreen><verb>gpg [--decrypt] [Data]</verb></tscreen> Also here <tt>stdout</tt> is preset, but with the <tt>-o</tt> option you can redirect the output to a file. <sect>Signing and checking signatures<label id="GPG-Minihowto-signatures"> <p> To sign data with your own key, use the command: <tscreen><verb>gpg -s (or --sign) [Data]</verb></tscreen> By doing this also compression takes place. This means that the result is not legible. If you want a legible result you can use: <tscreen><verb>gpg --clearsign [Data]</verb></tscreen> this will make sure that the results are clearly legible. Furthermore it does the same (signing data). With <tscreen><verb>gpg -b (or --detach-sign) [Data]</verb></tscreen> you can write the signature in a separate file. It is highly recommended to use this option especially when signing binary files (like archives for instance). Also the <tt>--armor</tt> option can be extremely useful here. <p> Quite often you find that data is encrypted and signed as well. The full instruction looks like: <tscreen><verb>gpg [-u Sender] [-r Recipient] [--armor] --sign --encrypt [Data] </verb></tscreen> The functionality of the options <tt>-u</tt> (<tt>--local-user</tt>) and <tt>-r</tt> (<tt>--recipient</tt>) are as described before. <P> When encrypted data has been signed as well, the signature is checked when the data is decrypted. You can check the signature of signed data by using the command: <tscreen><verb>gpg [--verify] [Data]</verb></tscreen> This will only work (of course) when you own the public key of the sender. <sect>Front ends<label id="GPG-Minihowto-frontends"> <p> To make life a lot easier in using GnuPG, you have a wide choice of programs that either use or support GnuPG encryption. There are graphical front ends that put your key administration at the click of a mouse button and many MUAs (Mail User Agents) let you encrypt and sign your Email messages seamlessly. A nearly full list of front ends is available from the <htmlurl url="http://www.gnupg.org/(en)/related_software/frontends.html" name="GnuPG Frontends"> page. We will highlight a few of them in this section. <sect1>Graphical interfaces <p> <sect2>GPA <p> <htmlurl url="http://www.gnupg.org/gpa.html" name="GPA">, the <em>GNU Privacy Assistant</em> is a graphical user interface for the GNU Privacy Guard (GnuPG). This is the standard graphical front end, provided by the GnuPG project. With GPA, you can view your keyring, import and export keys, generate keys, edit key properties and encrypt, sign or decrypt documents. Installing GPA is easy. Download the tarball, unpack and do the usual <tscreen><verb>./configure; make; make install.</verb></tscreen> Start the program by typing <tscreen><verb>gpa</verb></tscreen> <sect2>Seahorse <p> <htmlurl url="http://seahorse.sourceforge.net/" name="Seahorse"> is a GNOME front-end for GnuPG. It can be used for sign, encrypt, verify and decrypt text and files. The text can be taken from the clipboard, or written directly in the little editor it has. Seahorse is also a key manager, which can be used to edit almost all the properties of the keys stored in your key rings. You can install Seahorse from a Debian package (RPMs are not available at this time) or from the source tarball. Installing from source is like any other package. Download, untar, configure and make install. The installation puts seahorse in <tt>/usr/local</tt> and puts a menu item in the Gnome 'Applications' menu. <sect2>Geheimnis <p> <htmlurl url="http://devel-home.kde.org/~kgpg/index.html" name="KGPG"> is a front end for GnuPG which is based upon KDE. KGPG supports key signing, importing and exporting. It can also work with other KDE tools interactively like konquerer. <sect1>Email programs <p> Most popular Email programs (or MUAs) support GnuPG. Among these are at least the following: <itemize> <item>Mozilla <item>Evolution <item>Pine <item>Kmail <item>Eudora <item>Mutt <item>exmh </itemize> There are probably more; it is hardly possible to try them all. <p> Using GnuPG support in your mail program lets you decrypt Email messages sent to you that are encrypted with your public key, sign your messages so the receiving party can make sure you are the author and encrypt your Email with the public keys of your recipients. <sect2>Mozilla and Enigmail <p> Mozilla does not have GnuPG support in itself. To use GnuPG encryption with Mozilla, you must install a plug-in, such as <htmlurl url="http://enigmail.mozdev.org/" name="EnigMail">. Enigmail is a "plugin" for Mozilla/Netscape Mail which allows users to access the authentication and encryption features provided by the popular GPG and PGP software. Enigmail can encrypt/sign mail when sending, and also decrypt/authenticate received mail. It can also import/export public keys. <p> Enigmail can easily be installed by Mozilla extension management. The only thing you should do is to click on the proper link related with your Mozilla version on the <htmlurl url="http://enigmail.mozdev.org/download.html" name="Download"> page. Unfortunately, RPMs for enigmail are not available. <sect2>Evolution <p> Evolution is a well-known MUA for Linux and has fairly good GnuPG support. It can get e-mails encrypted and decrypt them. It also has built in key signing and key authorising options. It supports S/MIME but inline pgp support (which is not standard but used by some MUAs) is not implemented. To configure the GnuPG settings you should check the mail account preferences. <sect2>Kmail <p> Kmail, the standard Email program for KDE has integrated support for GnuPG and PGP encryption. To set things up so you can sign and decrypt messages, you have to enter your GnuPG user ID in the 'Identity' section of the Kmail configuration. When you send a new message, the message will not be signed or encrypted by default. You have to check the 'Sign message' and 'Encrypt message' buttons in the tool bar. <sect>Sources of information<label id="GPG-Minihowto-Informationsources"> <p> <sect1>GnuPG <p> <itemize> <item>The <url url="http://www.gnupg.org" name="GnuPG Homepage"> <item>The GnuPG Mailing list, including archives and descriptions on the <htmlurl url="http://www.gnupg.org/docs.html" name="GnuPG Homepage">. <item>The information enclosed in the GnuPG project (updated until version 0.9.2), however not yet very extensively done. And not to forget: <tscreen><verb>gpg --help </verb></tscreen>. This is very valuable information. </itemize> <sect1>PGP <p> PGP is the older and (still) widely spread and used cryptography program. Through the years a lot of documents have been made. This can be considered as very useful information. A lot of that information is so general that you can apply that to GnuPG as well. Check out the following URLs for these documents: <itemize> <item>The <url url="http://www.pgpi.com" name="International PGP Homepage"> <item>The <url url="http://www.scramdisk.clara.net/pgpfaq.html" name="PGP DH vs. RSA FAQ"> has information on the differences of these two algorithms. These are the two algorithms used by GnuPG. </itemize> <sect1>Keyservers <p> <itemize> <item> <url url="http://www.keyserver.net" name="Keyserver.net"> <item> <url url="http://wwwkeys.eu.pgp.net"> </itemize> <sect1>Books <p> <itemize> <item>B. Schneier, "Applied Cryptography, Second Edition", Wiley, 1996 <label id="BSchneier"> Deutsche Ausgabe unter dem Titel "Angewandte Kryptographie", Addison-Wesley, 1996 </itemize> <sect>About this document <p> Copyright © 1999 Brenno J.S.A.A.F. de Winter (English version) Copyright © 1999 Michael Fischer v. Mollard (original German version) Copyright © 2002 Arjen Baart (Dutch version) Copyright © 2004 Baris Cicek (Turkish version) <p> This document is free documentation you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details. <p> You should have received a copy of the GNU Library General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. <sect1>Versions <p> Original German versions: Version 0.1 was the first version in German <p> <bf>Version 0.1.0 (English) April 30th 1999, Dutch Queen's Day.</bf> <itemize> <item> This version is the translation of the German version in English with some adjustments. </itemize> <p> <bf>Version 0.1.1 (German)</bf> <p> <itemize> <item>New section "Boundaries to security" <item>Improved explanation of signatures <item>Changes after comments from Werner Koch (thanks!) </itemize> <p> <bf>Version 0.1.2 (English) April 3, 2002</bf> <itemize> <item>Corrected a few typos. <item>New section about front ends. </itemize> <p> <bf>Version 0.1.3 (Dutch) May 17, 2002</bf> <itemize> <item>This version is a translation of the English version into Dutch. </itemize> <bf>Version 0.1.4 (Turkish) May 3, 2004</bf> <itemize> <item>This version is a translation of the English version into Turkish. Also some additions are made on English version. Broken links are fixed. Frontends are revised. </itemize> All changes are documented in a diff file: <url url="http://www.stud.uni-goettingen.de/~s070674/GnuPGMiniHowto/" name="dieses Dokument"> <p> For the English or Dutch version: All remarks for this document can be sent to Brenno J.S.A.A.F. de Winter (<tt><htmlurl url="mailto:brenno@dewinter.com" name="brenno@dewinter.com"></tt>). or Arjen Baart (<tt><htmlurl url="mailto:arjen@andromeda.nl" name="arjen@andromeda.nl"></tt>). Comments help us make a better document and are greatly appreciated. For the German version: Anregungen, Kritik, Verbesserungen und Erweiterungen einfach an Michael Fischer v. Mollard (<tt><htmlurl url="mailto:fischer@math.uni-goettingen.de" name="fischer@math.uni-goettingen.de"></tt>) senden, damit dieses Dokument weiter verbessert werden kann. For the Turkish version: Baris Cicek (<tt><htmlurl url="mailto:baris teamforce.name.tr" name="baris teamforce.name.tr"></tt>) </article>