PGP Encryption

by Internal Labs

1

2.3k

PGP Encryption

by Internal Labs

1

Custom Activity

2.3k

carouselImage0

Summary

Summary


Overview

Overview

Use this activity to Securely send, share, and store sensitive data on demand or in batch, verify data integrity and users as part of an automated robotic process, and generate PGP Keys pairs within your workflow - locally on your own machine, and cryptographically sign a document so that recipients can be verified - and tampering detected.
  1. Generate a Key Pair: Generate a new public and private key for the provided username and password.
  2. Encrypt File: Encrypts a File using a PGP Public Key. The path to save the encrypted file is required.
  3. Decrypt File: Decrypts an Encrypted File using your Private Key and Passphrase.
  4. Sign File: Cryptographically sign a file. Sender can be verified and tampering detected
  5. Sign Clear File: Cryptographically sign a file. Leave the Text is human readable. Sender can be verified and tampering detected
  6. Verify Sign: Verify a file or stream was signed by the matching private key of the counterparty.
  7. Verify Clear Sign: Verify that a clear signed file or stream was signed by the matching private key of the counterparty
  8. Encrypt and Sign: Encrypt a file using a public key and sign using your private key. The process is often that you encrypt with the public key of your counterparty and sign with your private key. Your counterpart would then decrypt with their private key and verify your signature with your public key.
  9. Decrypt and Verify: Decrypt and verify signature of an encrypted and signed file. This is used when your sender encrypts a document with your public key and then signs the encrypted document. You'd then decrypt the message with your private key and verify their identity with their public key.
Note: The PGP activities are offered to allow robots to interact directly with existing business processes that leverage PGP for privacy. They are not designed to provide new information security paradigms, but instead a means to allow the robot to interact with the existing security that is being deployed within a business.

Features

Features


Additional Information

Additional Information

Dependencies


Code Language

Visual Basic

Runtime

Windows Legacy (.Net Framework 4.6.1)

Publisher

Internal Labs

Visit Publisher's Page

License & Privacy

License Agreement

Privacy Terms

Technical

Version

1.0.4

Updated

23 Mar 2021

Works with

UiPath 2020.10.4

Certification

Silver Certified

Tags

encryption
decryption
gdpr
privacy
Cryptography
PGP

Support

UiPath Community Support

Resources