TUTORIAL KUNCI RSA (revisi 140217-r02)

Return to Lab 01


  1. IF YOU'RE NOT SATISFIED WITH YOUR RESULT, please repeat these steps. Don't forget to remove the previous .gnupg product from your home directory.
    $ cd ..
    cd ..
    $ rm -rf ~/.gnupg

    Once you decide to use your current result, do NOT change the key again until the end of semester.

Creating RSA Key

  1. Execute command:
    $ gpg --gen-key
    gpg (GnuPG) 2.0.22; Copyright (C) 2013 Free Software Foundation, Inc.
    This is free software: you are free to change and redistribute it.
    There is NO WARRANTY, to the extent permitted by law.
  2. Choose to make "RSA and RSA (default)" (1) KEY with the size of 4096.
    Silakan pilih kunci yang anda inginkan:
       (1) RSA and RSA (default)
       (2) DSA and Elgamal
      (3) DSA (hanya menandai)
      (4) RSA (hanya menandai)
    Pilihan anda? 1
    RSA keys may be between 1024 and 4096 bits long.
    What keysize do you want? (2048) 4096
    Keysize yang diminta adalah 4096 bit
  3. Type 6m so that your KEY will expire after 6 months.
    Silakan spesifikasikan lama kunci tetap valid.
           0  = kunci tidak pernah berakhir
         <n>  = kunci berakhir dalam n hari
         <n>w = kunci berakhir dalam n minggu
         <n>m = kunci berakhir dalam n bulan
         <n>y = kunci berakhir dalam n tahun
    Kunci valid untuk? (0) 6m
    Key expires at Sen 04 Agu 2014 06:05:15  WIB
    Is this correct? (y/N) y
  4. Complete your identity based on your SIAK. Use your main (UI) email as your email and give appropriate comment. When you complete this, choose (O)kay.
    Protect your KEY with your SIAK passphrase and REMEMBER YOUR PASSPHRASE.
    GnuPG needs to construct a user ID to identify your key.
    Nama sebenarnya: Jan Peter Alexander Rajagukguk
    Alamat email: jp@ui.ac.id
    Komentar: Asisten Lab OS
    Anda memilih USER-ID ini:
       "Jan Peter Alexander Rajagukguk (Asisten Lab OS) <jp@ui.ac.id>" 
    Ganti (N)ama, (K)omentar, (E)mail atau (O)ke/(Q)uit? O
    Anda perlu sebuah passphrase untuk melindungi kunci rahasia anda.
    Kita perlu membuat banyak byte random. Adalah ide yang baik untuk melakukan
    aksi lain (mengetik pada keyboard, menggerakkan mouse, memakai disk)
    selama pembuatan prima; ini akan memberi random number generator kesempatan
    yang baik untuk memperoleh entropi.
  5. While waiting for the random entrophy to be constructed, you can type, browse and do other things to make the process quicker. After the entrophy is enough the computer will display:
    gpg: key 94CE98B5 marked as ultimately trusted
    kunci publik dan rahasia dibuat dan ditandai.
    gpg: memeriksa trustdb
    gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
    gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
    gpg: pemeriksaan trustdb berikutnya pada 2014-08-04
    pub   4096R/94CE98B5 2014-02-05 [expires: 2014-08-04]
          Key fingerprint = 84DD 7537 2763 437D 3FC8  D1FC D63B 26E9 94CE 98B5
    uid                  Jan Peter Alexander Rajagukguk (Asisten Lab OS) <jp@ui.ac.id>
    sub   4096R/AD60F010 2014-02-05 [expires: 2014-08-04]
  6. To see the KEY that has been generated, type:
    $ gpg --list-keys
    pub   4096R/94CE98B5 2014-02-05 [expires: 2014-08-04]
    uid                  Jan Peter Alexander Rajagukguk (Asisten Lab OS) <jp@ui.ac.id>
    sub   4096R/AD60F010 2014-02-05 [expires: 2014-08-04]
  7. Above is all you need to create your GPG Key. The list below is used to erase your key if you don't want to use it again.

(Optional) Erase Key

When you want to cleanup your home directory. DON'T use this procedure if you still use your key.

(Opsional) Erase Secret Key

$ gpg --delete-secret-key 94CE98B5 

(Opsional) Erase Public Key

$ gpg --delete-key 94CE98B5 

Return to Lab 01
Return to Wiki