Managed File Transfer
Simplify data security, automation, server-to-server file transfers, and more.
Cloud File Transfer
Secure data exchange with trading partners and applications in the cloud.
Strong encryption and authentication technology for critical file transfers.
Drummond Certified solution for automating AS2 file transfers.
Open PGP Encryption
Asymmetric cryptology for protecting confidential files at rest and in motion.
Sharing & Collaboration
Simple and secure interfaces for user-to-user file sharing and collaboration.
Build automated workflows to move files effortlessly between internal systems, users, and trading partners.
EDI File Translation
Read, write, and map EDI X12 and XML files between databases.
Keep your sensitive data secure, no matter where it resides, or how it's shared.
Send files securely with GoAnywhere Managed File Transfer, an MFT tool that secures & automates data exchanges and eliminates the need for manual methods like custom programs & scripts. Start a trial today.
Reverse and forward proxy solution for keeping sensitive files out of the DMZ. Start a free trial.
Secure ICAP Gateway
Clearswift's suite of secure solutions and GoAnywhere MFT integrate to enhance your infrastructure and keep your sensitive data secure.
Explore how GoAnywhere MFTaaS gives you the power to securely transfer files while we take care of setup, hosting, and management.
Powerful free FTP client for file transfer automation with GoAnywhere MFT.
Enterprise-level FTP server included in GoAnywhere MFT. Start a free trial.
User-to-user file sharing and synchronization with GoDrive™.
Download Open PGP Studio
Encryption and key management, free with Open PGP™ Studio.
If you’re looking to learn more about PGP, one of the most popular encryption methods used today to encrypt files and send encrypted emails, keep reading to learn what it is, how it works, along with its offshoots GPG and Open PGP.
PGP, Pretty Good Privacy, is a standard option for file encryption and authentication. It is currently owned by Symantec, a technology company that develops and sells software solutions.
PGP is used to encrypt files to secure them for file transfer. It uses several encryption technologies, including hashing, data compression, and public/private keys to protect sensitive information. PGP is a flexible solution for today’s cybersecurity needs: it is often used to encrypt files before exchanging them with trading partners or remote locations and can also encrypt emails, directories, and disk partitions.
PGP uses a combination of encryption methodologies, including hashing, data compression, symmetric-key cryptography, and public-key cryptography to secure data. It can be used to encrypt:
GPG, or GnuPG, is a different implementation of the Open PGP standard (more on that below), and a powerful alternative to Symantec’s official PGP software. Also known as the GNU Privacy Guard, GPG is useful in that it works well with non-GPG-based products and can open and decrypt files encrypted by PGP or Open PGP.
Keep reading: PGP vs. GPG: What’s the Difference?
Open PGP is an open source offshoot of PGP that uses PGP as its foundation and was developed by Phil Zimmermann, a computer scientist and cryptographer who also developed PGP. The term “Open PGP” is commonly used to describe tools, features, and solutions that support open-source PGP encryption technology. Open PGP gives developers a way to include PGP in software that is typically free to the public. To do so, developer and vendors who include Open PGP in their software solutions must follow IETF (Internet Engineering Task Force) standards and allow for easy integration with other Open PGP-compliant software vendors.
Keep reading: OpenPGP, PGP, and GPG: What is the Difference?
Open PGP’s main function is to encrypt email communication, but it can be used for a variety of use cases, which is why developers choose to incorporate Open PGP into their products.
Open PGP file encryption, like standard PGP, lets you store sensitive information or transmit information across unsecure networks (i.e., the internet or email) so only the intended recipient can read it. It uses asymmetric (public key) cryptography and addresses the issues of data authentication and non-repudiation through the ability to "sign" files via embedded digital signatures. According to the official OpenPGP website, even intelligence organizations aren’t able to break Open PGP encryption. These features give organizations a high level of data protection, making Open PGP one of the most popular file encryption methods used today.
Encrypt, decrypt, sign files, and verify documents with GoAnywhere Open PGP Studio, a free encryption solution for IT users and teams.
Try It Today
PGP was developed in the early 1990s by Phil Zimmermann & Associates, LLC as a method of securing files that were posted on pre-internet bulletin boards. PGP has changed ownership several times between the 90s and now, and is currently owned by Symantec.
PGP gained popularity because it was initially available freely, which made it attractive to users who wanted to encrypt files and send encrypted emails at no cost. The layers of security are also attractive and helped PGP spread among security-conscious users – PGP uses both symmetric encryption and public key encryption, so users can send or receive messages from people they’re never met without exchanging private encryption keys.
Although some outlets have declared that PGP is dead, PGP, Open PGP, and GPG are all still in use today, and it continues to be a secure way to encrypt your data.
PGP encryption is done with software applications that obscure the message before either the application or the user sends it to the recipient.
By transforming plain, readable text into a complex code of unreadable characters, PGP encryption provides essential privacy missing from online communication. Once encrypted – hashed, data compressed, and “locked” via either symmetric private key cryptography or asymmetric public key cryptography – the message travels to the recipient fully cyphered. The recipient then uses PGP to decrypt the message.
With this system, each user has both:
The public key encrypts the message or file, while the private key decrypts.
This encryption standard addresses the issues of data authentication and non-repudiation through the ability to "sign" files via embedded digital signatures. Digital signatures use public-key cryptography to authenticate that data is coming from the source it claims to be from and has not been tampered with. Digital signatures are sent alongside the message body and work by using an algorithm to combine the sender’s private key with the data they are authenticating. The process makes digital signatures essentially impossible to forge unless the private key has been compromised.
Keep reading: Everything You Need to Know about PGP Encryption
PGP is used to encrypt or decrypt the file you exchange and having a trustworthy PGP software is paramount.
For sending files with PGP, the sender will need to have access to the recipient’s public key before they can send their files. Once the file is compressed, PGP will efficiently encrypt the plaintext with private key cryptography, turning the message into ciphertext. The session key is then encrypted using the sender’s public key. Once the recipient has received the encrypted file, they can decrypt it using their private key.
Some managed file transfer (MFT) tools, including GoAnywhere MFT, support Open PGP. Using an MFT solution gives you the ability to leverage Open PGP to:
Maintain the privacy and integrity of the data you exchange with external trading partners, clients, customers, and internal users when you use Open PGP via MFT.
Keep reading: 5 Benefits of PGP Decryption Using Managed File Transfer
Schedule a 15, 30, or 60-minute demo to discover how Open PGP encryption can boost your file security.
Learn how to decrypt files using Open PGP and GoAnywhere Workflows using the PGP Decrypt Task.
Discover how to use Open PGP encryption software from GoAnywhere to encrypt files and sign them with this tutorial. Store sensitive information or transmit across insecure networks with Open PGP.
VIEW ALL RESOURCES: PGP
How to Buy
Copyright © 2021 HelpSystems. GoAnywhere® is a registered trademark of HelpSystems.
Amazon S3 Bucket
Message Queue (MQ)
Open PGP for IBM i
Zip with AES
Fixed Width Text
Commands and APIs
Auditing and Reporting
Microsoft Dynamics 365
Security and Compliance
Guides and Tutorials
Getting Started with GoAnywhere MFT
Getting Started with File Transfer Services
Getting Started with Projects
Automating Project Workflows
How to Encrypt Files with Open PGP
How to Import a CSV File into a Database
Getting Started with Domains
Converting Scripts to Projects
How to Read JSON Data and Insert it into a Database
How to Query a Database and Write the Data to JSON
Using the SQL Wizard to Join Data from Two Database Tables
How to Enable SSL for HTTPS/AS2 Server Connections
Configuring the AS2 Client to Send AS2 Messages
How to Configure the AS2 Service to Receive AS2 Transfers
Configuring Web User Accounts to Receive AS2 Messages
Reverse and Forward Proxy
PCI DSS Compliance
Linux and Unix
Mac OS X
Encrypt and Sign
Decrypt and Verify
Implementation & Configuration
AS2, AS3 and AS4 Transfers
File Transfer Automation
File Sync & Sharing
Get the Most Out of GoAnywhere
Send Large Files
AIX and UNIX
Banking and Finance
IT & Telecom
Media & Entertainment