The GNU Privacy Guard
*Gpg Import Secret Key
*Gpg Key Generation Server Private Access
*Gpg Key Generation Server Private Edition
*Gpg Key Generation Server Private Server
The recipient of the message then decrypts the message on their own computer using their private key. This server is a member of the sks-keyserver pool of servers. It hosts OpenPGP keys in a fashion that allows them to be quickly and easily retrieved and used by different client software.
GnuPG is a complete and free implementation of the OpenPGP standard asdefined by RFC4880 (also known as PGP). GnuPG allows you to encrypt andsign your data and communications; it features a versatile key managementsystem, along with access modules for all kinds of public keydirectories. GnuPG, also known as GPG, is a command line tool withfeatures for easy integration with other applications. A wealth offrontend applications and libraries are available. GnuPG alsoprovides support for S/MIME and Secure Shell (ssh).
Since its introduction in 1997, GnuPG is Free Software (meaning thatit respects your freedom). It can be freely used, modified anddistributed under the terms of the GNU General Public License .
The current version of GnuPG is 2.2.20. See the downloadpage for other maintained versions.
Gpg4win is a Windows version of GnuPG featuring a context menu tool, acrypto manager, and an Outlook plugin to send and receive standardPGP/MIME mails. The current version of Gpg4win is 3.1.11.Reconquer your privacy
Arguing that you don't care about the right to privacybecause you have nothing to hide is no different fromsaying you don't care about free speech because you havenothing to say. – Edward Snowden
Using encryption helps to protect your privacy and the privacy of thepeople you communicate with. Encryption makes life difficult for bulksurveillance systems. GnuPG is one of the tools that Snowden used touncover the secrets of the NSA.
Please visit the Email Self-Defense site to learn how and why youshould use GnuPG for your electronic communication.News
The latest blog entries:
The latest release news:
(all news)Gpg4win fully approved for EU RESTRICTED.
After about a year of tweaking details of the approval, Gpg4win andGnuPG are now approved for EU RESTRICTED communication (VS-NfD). Thisapprovals covers the protocols S/MIME and OpenPGP (public-key andsymmetric-only) with hard- and soft-tokens. Our commercial branchGnuPG.com released a press notice (in German) today.GnuPG 2.2.19 released (2019-12-07)Gpg Import Secret Key
We are pleased to announce the availability of GnuPG version 2.2.19.This version fixes a regression introduced with the last release.{more}GnuPG 2.2.18 released (2019-11-25)
We are pleased to announce the availability of GnuPG version 2.2.18.This is maintenance release to fix a couple of minor bugs and providea few feature updates. This release also retires the use of SHA-1 keysignatures created since this year. {more} (see also)Libgcrypt 1.8.5 released (2019-08-29)
If you care about local site-channel attacks on ECDSA you may want toupdate to Libgcrypt version 1.8.5. CVE-CVE-2019-13627 {more}
Previous: The quick key manipulation interface, Up: Unattended Usage of GPG [Contents][Index]4.5.4 Unattended key generation
The command --generate-key may be used along with the option--batch for unattended key generation. This is the mostflexible way of generating keys, but it is also the most complex one.Consider using the quick key manipulation interface described in theprevious subsection “The quick key manipulation interface”.
The parameters for the key are either read from stdin or given as afile on the command line. The format of the parameter file is asfollows:
* Text only, line length is limited to about 1000 characters.
* UTF-8 encoding must be used to specify non-ASCII characters.
* Empty lines are ignored.
* Leading and trailing white space is ignored.
* A hash sign as the first non white space character indicates a comment line.
* Control statements are indicated by a leading percent sign, the arguments are separated by white space from the keyword.
* Parameters are specified by a keyword, followed by a colon. Arguments are separated by white space.
* The first parameter must be ‘Key-Type’; control statements may be placed anywhere.
* The order of the parameters does not matter except for ‘Key-Type’ which must be the first parameter. The parameters are only used for the generated keyblock (primary and subkeys); parameters from previous sets are not used. Some syntactically checks may be performed.
* Key generation takes place when either the end of the parameter file is reached, the next ‘Key-Type’ parameter is encountered or at the control statement ‘%commit’ is encountered.
Control statements:%echo text
Print text as diagnostic.Gpg Key Generation Server Private Access%dry-run
Suppress actual key generation (useful for syntax checking).%commit
Perform the key generation. Note that an implicit commit is done atthe next Key-Type parameter.%pubring filename
Do not write the key to the default or commandline given keyring butto filename. This must be given before the first commit to takeplace, duplicate specification of the same filename is ignored, thelast filename before a commit is used. The filename is used until anew filename is used (at commit points) and all keys are written tothat file. If a new filename is given, this file is created (andoverwrites an existing one).
You can use your key in any Google Maps plugin, for example, is a perfect choice if you need a customizable map with various locations and option to create location lists. New generated google maps api key not working 2017. It allows to show maximum info about your business and has an automatic route calculation to attract more real-life visitors.An important note for Elfsight Google Maps users: make sure to add “apps.elfsight.com” and the name of the domain, where you are going to use the widget, to the domain field.
See the previous subsection “Ephemeral home directories” for a morerobust way to contain side-effects.%secring filename
This option is a no-op for GnuPG 2.1 and later.
See the previous subsection “Ephemeral home directories”.%ask-passphrase%no-ask-passphrase
This option is a no-op for GnuPG 2.1 and later.%no-protection
Using this option allows the creation of keys without any passphraseprotection. This option is mainly intended for regression tests.%transient-key
If given the keys are created using a faster and a somewhat lesssecure random number generator. This option may be used for keyswhich are only used for a short time and do not require fullcryptographic strength. It takes only effect if used together withthe control statement ‘%no-protection’.
General Parameters:Key-Type: algo
Starts a new parameter block by giving the type of the primarykey. The algorithm must be capable of signing. This is a requiredparameter. algo may either be an OpenPGP algorithm number or astring with the algorithm name. The special value ‘default’ maybe used for algo to create the default key type; in this case a‘Key-Usage’ shall not be given and ‘default’ also be usedfor ‘Subkey-Type’.Key-Length: nbits
The requested length of the generated key in bits. The default isreturned by running the command ‘gpg --gpgconf-list’.Key-Grip: hexstring
This is optional and used to generate a CSR or certificate for analready existing key. Key-Length will be ignored when given.Key-Usage: usage-list
Space or comma delimited list of key usages. Allowed values are‘encrypt’, ‘sign’, and ‘auth’. This is used togenerate the key flags. Please make sure that the algorithm iscapable of this usage. Note that OpenPGP requires that all primarykeys are capable of certification, so no matter what usage is givenhere, the ‘cert’ flag will be on. If no ‘Key-Usage’ isspecified and the ‘Key-Type’ is not ‘default’, all allowedusages for that particular algorithm are used; if it is not given but‘default’ is used the usage will be ‘sign’.Subkey-Type: algo
This generates a secondary key (subkey). Currently only one subkeycan be handled. See also ‘Key-Type’ above.Subkey-Length: nbits
Length of the secondary key (subkey) in bits. The default is returnedby running the command ‘gpg --gpgconf-list’.Subkey-Usage: usage-list
Key usage lists for a subkey; similar to ‘Key-Usage’.Passphrase: string
If you want to specify a passphrase for the secret key, enter it here.Default is to use the Pinentry dialog to ask for a passphrase.Name-Real: nameName-Comment: commentGpg Key Generation Server Private EditionName-Email: email
The three parts of a user name. Remember to use UTF-8 encoding here.If you don’t give any of them, no user ID is created.Expire-Date: iso-date|(number[d|w|m|y])
Set the expiration date for the key (and the subkey). It may eitherbe entered in ISO date format (e.g. '20000815T145012') or as number ofdays, weeks, month or years after the creation date. The specialnotation 'seconds=N' is also allowed to specify a number of secondssince creation. Without a letter days are assumed. Note that thereis no check done on the overflow of the type used by OpenPGP fortimestamps. Thus you better make sure that the given value makesense. Although OpenPGP works with time intervals, GnuPG uses anabsolute value internally and thus the last year we can represent is2105.Creation-Date: iso-date
Set the creation date of the key as stored in the key information andwhich is also part of the fingerprint calculation. Either a date like'1986-04-26' or a full timestamp like '19860426T042640' may be used.The time is considered to be UTC. The special notation 'seconds=N'may be used to directly specify a the number of seconds since Epoch(Unix time). If it is not given the current time is used.Preferences: string
Set the cipher, hash, and compression preference values for this key.This expects the same type of string as the sub-command ‘setpref’in the --edit-key menu.Revoker: algo:fpr [sensitive]
Add a designated revoker to the generated key. Algo is the public keyalgorithm of the designated revoker (i.e. RSA=1, DSA=17, etc.)fpr is the fingerprint of the designated revoker. The optional‘sensitive’ flag marks the designated revoker as sensitiveinformation. Only v4 keys may be designated revokers.Keyserver: stringGpg Key Generation Server Private Server
This is an optional parameter that specifies the preferred keyserverURL for the key.Handle: string
This is an optional parameter only used with the status linesKEY_CREATED and KEY_NOT_CREATED. string may be up to 100characters and should not contain spaces. It is useful for batch keygeneration to associate a key parameter block with a status line.
Here is an example on how to create a key in an ephemeral home directory:
If you want to create a key with the default algorithms you would usethese parameters:
Previous: The quick key manipulation interface, Up: Unattended Usage of GPG [Contents][Index]