1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
# Fundamental Concepts
If you're unfamiliar with GPG or PGP, it would be beneficial to learn some
fundamental concepts before using GpgFrontend. This can help prevent potential
mistakes, such as accidentally sharing your private key.
## Essential Concepts
Before you start using GPG, you need to generate a key pair, analogous to a key
ring. Each key pair comprises at least two keys: a public key and a
corresponding private key. It is possible for a key pair to contain multiple
public keys and their associated private keys, which we'll discuss later.
The public key can be shared with others, allowing them to encrypt data they
want to send you. Conversely, the private key should remain confidential since
its exposure can compromise your encryption.
It's vital to understand that the public key is used for encryption, and the
ciphertext encrypted with your public key can only be decrypted using your key
pair's corresponding private key. This process is based on cryptographic
principles and is reliable unless your private key gets compromised. Similarly,
you can encrypt a message with your private key, and someone else can decrypt it
using your public key, establishing a signature verification mechanism.
While understanding the underlying cryptography of GPG isn't necessary for most
users, remembering these basic principles can be beneficial.
## Multiple Pairs of Public and Private Keys in a Key Pair
A key pair always contains at least one public-private key pair, but there's no
maximum limit. It's possible to generate additional public and private subkeys
to add to the key pair. Each pair consists of one public key and one private
key, which we refer to as the primary key pair.
Users can specify the purpose of each subkey pair. For instance, the first pair
can be used for encryption and decryption, the second for signing and
verification, and so forth. It's important to define the intended usage when
generating subkeys.
The primary key is automatically generated when creating the key pair, and users
can add subkeys as needed. When generating the primary key or subkeys, users can
select algorithms such as RSA or DSA.
## The First Pair of Public and Private Keys in a Key Pair (Primary Key)
The initial public-private key pair (primary key) in a key pair is crucial as
all subsequent subkeys are tied to it. If the primary key is compromised, they
could generate subkeys based on that information and impersonate the key owner.
Therefore, it's crucial to keep the primary key's private key confidential,
while the public key can be shared. If the private key of the primary key is
compromised, it makes the entire key pair vulnerable and its use should be
immediately discontinued.
|