diff options
Diffstat (limited to 'src/content/docs/guides/fundamental-concepts.md')
-rw-r--r-- | src/content/docs/guides/fundamental-concepts.md | 203 |
1 files changed, 139 insertions, 64 deletions
diff --git a/src/content/docs/guides/fundamental-concepts.md b/src/content/docs/guides/fundamental-concepts.md index dd19888..78e95b6 100644 --- a/src/content/docs/guides/fundamental-concepts.md +++ b/src/content/docs/guides/fundamental-concepts.md @@ -5,89 +5,164 @@ sidebar: order: 1 --- -If you're new to GPG (GNU Privacy Guard) or PGP (Pretty Good Privacy), it's -essential to understand some key concepts before diving in. This knowledge can -help you avoid common pitfalls, such as accidentally sharing your private key, -and ensure your communications remain secure. +If you're new to **GPG (GNU Privacy Guard)** or **PGP (Pretty Good Privacy)**, +this guide is for you. GPG is a free, open-source system for **encrypting +information** and **verifying identity**. It's widely used for secure +communication, file protection, and digital signing. -## Key Concepts of GPG/PGP +Let’s walk through the core concepts in a beginner-friendly way. -### Key Pair Basics +## 🔐 What Is a Key Pair? -In the world of GPG/PGP, everything starts with a key pair. Think of a key pair -like a set of two uniquely related keys on a key ring: +At the heart of GPG is the **key pair**: two mathematically linked keys. -- **Public Key**: This is like your home address that you can share with anyone. - Others will use it to send you encrypted messages or verify your digital - signature. -- **Private Key**: This is akin to the key to your house. It must be kept secret - because it can decrypt the messages sent to you or sign messages from you. +- **Public Key**: Share this with anyone. Others use it to: + - Send you encrypted messages. + - Verify your digital signature. + +- **Private Key**: Keep this secret. You use it to: + - Decrypt messages sent to you. + - Sign data so others know it’s really from you. -#### Why Both Keys? +> 🧠 Think of it like a mailbox: +> - Your public key is the address — people can send you letters. +> - Your private key is the key to open the mailbox — only you can read what’s +> inside. -The magic of this system lies in its use of cryptographic algorithms. Data -encrypted with your public key can only be decrypted by your private key, and -vice versa. This ensures that only the intended recipient can read the message, -and it can verify the sender's identity if a signature is used. +## 🔧 Generating a Key Pair -### Generating Your Key Pair +To use GPG, you first create a key pair. During creation, you’ll choose: -Before you can start encrypting or signing anything, you need to generate your -key pair. This process involves choosing a cryptographic algorithm (like RSA or -DSA) and often setting a key size (with larger sizes being more secure but -slower). +- A **cryptographic algorithm** (e.g., RSA, ECC). +- A **key size** (larger sizes are more secure but slower). +- A **passphrase** to protect the private key. -#### Safety First +> 🔒 Your passphrase adds a layer of protection — even if someone gets your key +> file, they can’t use it without this password. -When creating your key pair, you'll also be asked to enter a passphrase. This -adds an extra layer of security, as the passphrase will be needed to access your -private key. Choose a strong, memorable passphrase to protect your key. +## 🧩 What Are Subkeys? -### Understanding Subkeys +A GPG identity doesn’t stop at one key pair. You can create **subkeys** under +your primary key. These are used for specific tasks: -A GPG key pair doesn't have to be limited to just one public and one private -key. You can generate subkeys for specific purposes, such as: +- **Encryption Subkey**: Used to encrypt/decrypt data. +- **Signing Subkey**: Used to create/verifiy digital signatures. -- **Encryption Subkey**: Used solely for encrypting and decrypting messages. -- **Signing Subkey**: Used for creating and verifying digital signatures. +Subkeys are tied to your identity, but they can be revoked or replaced +independently. -Subkeys are tied to your primary key pair but can be revoked or replaced -independently, which is useful if a subkey is compromised but your primary key -remains secure. +> ✅ Tip: Use subkeys for everyday tasks and keep your **primary key offline** or +> backed up securely. -### The Role of the Primary Key +## 🧱 Understanding the Primary Key -Your primary key pair is the foundation of your GPG identity. All subkeys are -associated with this primary pair. The primary key is typically used for -signing, to establish trust within the network, and to certify subkeys. +Your **primary key** is your core identity. It: +- Links to your user ID (usually name + email). +- Signs your subkeys. +- Can certify other people's public keys (used to build trust networks). -#### Protect Your Primary Key +### Why Is It So Important? -If your primary private key is compromised, the entire security of your key ring -is at risk. Therefore, it's crucial to: +If someone gains access to your **primary private key**, they can impersonate +you. That’s why: -- Keep your primary private key in a secure location. -- Use subkeys for day-to-day encryption and signing tasks. -- Consider using hardware security modules (HSMs) or smart cards to store keys - securely. +- It should be **backed up** securely. +- It’s best to use **subkeys** for daily operations. +- Some people even keep their primary key **offline** for maximum safety. -## Best Practices for Beginners +## ✉️ How Encryption Works -1. **Backup Your Keys**: Securely backup your private keys (especially the - primary one) in case of hardware failure or loss. -2. **Use Strong Passphrases**: Your key's security is only as good as your - passphrase. Use a long, complex passphrase that is difficult to guess. -3. **Regularly Update Your Keys**: Over time, cryptographic standards evolve. - Regularly review and update your keys and algorithms to ensure they remain - secure. -4. **Learn Key Management**: Practice importing, exporting, revoking, and - verifying keys. Good key management habits are crucial for maintaining your - security over time. -5. **Engage with the Community**: The GPG/PGP community is vast and supportive. - Join forums, read blogs, and participate in discussions to learn from - experienced users. +Imagine you want to send a private message to someone: -By understanding these fundamental concepts and adhering to best practices, -you'll be well on your way to securely using GPG/PGP. Remember, the goal is to -protect your communications and identity in the digital world, and a solid grasp -of these basics is the first step.
\ No newline at end of file +1. You encrypt the message using their **public key**. +2. Only their **private key** can decrypt it. +3. You can also add your **signature** using your private key. +4. They can **verify your signature** with your public key. + +This ensures: +- **Privacy**: No one but the intended recipient can read the message. +- **Authenticity**: The recipient knows the message is from you. + +## 🖋️ What Is Digital Signing? + +Signing is like sealing a document with your unique fingerprint. It allows +others to: + +- Confirm the message hasn’t been changed. +- Confirm that **you** are the sender. + +Digital signatures are used to: +- Sign emails. +- Sign files or software packages. +- Sign other people's public keys (to build trust). + +## 📦 Real-Life Use Cases + +### Secure Email + +You want to email a sensitive document: +- Encrypt it using the recipient’s public key. +- Sign it with your private key. +- The recipient decrypts and verifies it. + +### Software Publishing + +You release a file or program online: +- You sign it. +- Users can verify the signature before using it. + +### Building Trust + +You meet someone at a conference: +- You exchange and sign each other’s keys. +- Anyone who trusts your key may now also trust theirs. + +## ✅ Best Practices for New Users + +1. **Back Up Your Keys**: Store your private key and revocation certificate in a + secure, offline location. +2. **Use Strong Passphrases**: The private key is only as safe as the password + protecting it. +3. **Separate Daily and Master Keys**: Use subkeys for regular work; keep your + primary key protected. +4. **Update When Needed**: Cryptography evolves — review and rotate keys as + needed. +5. **Revoke If Compromised**: If your private key is stolen or lost, revoke it + immediately and inform your contacts. +6. **Understand the Web of Trust**: GPG builds trust by people signing each + other's keys — this forms a decentralized trust model. + +## 🧭 Summary + +GPG is a powerful tool for privacy and digital identity. By learning: +- How keys work, +- When to encrypt vs. sign, +- And how to protect your credentials, + +You’re taking a big step toward securing your digital life. + +## 🧰 Where Does GpgFrontend Fit In? + +While GPG/PGP itself is powerful, it is mostly command-line based — which can be +intimidating for beginners. + +This is where **GpgFrontend** comes in. + +GpgFrontend is a graphical interface built on top of GnuPG. It helps users +perform key operations such as: + +- Generating and managing key pairs +- Encrypting and decrypting messages or files +- Signing and verifying content +- Uploading and fetching keys from key servers +- More... + +All of this can be done through a **clear and user-friendly interface**, making +GPG accessible without needing to learn complex commands. + +Whether you're just starting to explore encrypted communication or already +managing multiple keys, GpgFrontend acts as a bridge — combining the strength of +GPG with simplicity and clarity. + +> 🧩 You focus on **secure communication** — let GpgFrontend handle the +> complexity behind it.
\ No newline at end of file |