Gpg Generate Key Long Time

Posted on
Gpg Generate Key Long Time Average ratng: 8,0/10 1713 votes

A readme and a script to generate PGP keys using GnuPG, using the current best practices.

Its goal is to provide a concise and up-to-date description of best practices regarding the usage of GnuPG. A basic understanding of public key cryptography, and GnuPG in particular is assumed.

Next: Key Management with GPG Up: I want to use Previous: Any other Linux distribution Contents Setting up GPG for the first time Before you can begin to use GPG for encryption, you should create a key pair. This step will create a secret key and a public key. Apr 04, 2017 GPG is able to create several types of keypairs, but a primary key must be capable of making signatures. # gpg -gen-key Please select what kind of key you want: Your selection? 1 RSA keys may be between 1024 and 4096 bits long. What keysize do you want? (2048) 4096 Please specify how long the key should be valid. Key is valid for? May 26, 2017 At this point, gpg will generate the keys using entropy. Entropy describes the amount of unpredictability and nondeterminism that exists in a system. GPG needs this entropy to generate a secure set of keys. This process may take a long time depending on how active your system is and the keysize you selected. The problem is that some tools, for example GPG, require the use of /dev/random for key generation and will block until they receive sufficient entropy. This is causing tremendous issues for SecureDrop because our automated tests need to generate GPG keypairs, and at this point Travis is timing out more often than not because GPG is blocking on. Oct 23, 2019  A long time ago, in a galaxy far, far away, I found out about SSH keys and GPG keys and I thought they were good so I started using them, obviously the wrong way (if you want to know a little bit more, you can start here and also here).I even tried to use GPG.

If something is not clear or you're new to PGP, then make sure to start with the Glossary below.

Some quick insights

  • Public key cryptography happens between two encryption keys, which is not necessarily only two humans, unless enough care has been taken when exchanging public keys and to keep the secret keys indeed secret.
  • In a digital networked world it's not possible to delete any published information, it must be assumed to be just there forever. This also applies to PGP keys.
  • Properly authenticated revocation requests can be published, though. If such requests are digitally signed (authenticated), then they will be honored by programs handling e.g. PGP keys (key servers, client programs), and the revoked data will be ignored/hidden from the user accordingly.
  • Having a separately stored revocation certificate in your backup comes very handy if your key gets compromised or lost. By publishing it you can tell your peers that your key should not be used anymore.
  • The most precious part of a PGP key block is its master signing key.
  • The master signing key of a PGP key block is rarely needed (mostly when editing/extending the PGP key block itself and when signing other people's keys).
  • You can only trust you generated PGP key to the extent you trust the software environment and/or the computer generating it. Opensource is a minimum in security, so use a Linux live cd or something similar from a trusted source to generate and/or use your master signing key, preferably while being offline (see live CD's in the Glossary)!
  • Specialized hardware solutions offer much better protection for secret keys. See below.
  • If you forget the passphrase for your already published key, and you don't have a revocation certificate either, then your key will be lingering on the keyservers confusing your peers, who will annoy you by sending you messages you cannot read.
  • Passphrases: three to five word long sentences that you make up yourself (based on a non-trivial vocabulary, personal experiences, dreams, preferably with s0me typ0s) are easier to remember than a bunch of random characters, and are better passphrases. You can even build a little story around them to have separate but semantically interconnected passphrases (for the keys, for the revocation certificate, etc.). A vivid dream or delightful fantasies can be a good basis for something you won't forget.. :)
  • ..but at the end of the day it'll always be a tradeoff between security and convenience. Assess your risks and act accordingly.

The PGP algorithm needs an extra parameter, a key, to sign or encrypt data. That parameter is a cryptographic keypair, usually one of the subkeys from a PGP key block. New subkeys can be freely generated and published, so forward secrecy can be achieved by publishing new subkeys, as long as the secret part of the master signing keypair has not been compromised. Therefore the most precious part of a PGP key block is its master signing key, because whenever new information is attached to the key block (e.g. a new subkey is generated), this new data must be signed by the secret part of the master signing keypair, otherwise conforming programs will reject the new unsigned or improperly signed part of the PGP key block. In this scheme publishing valid additions to the key block is only possible by people who know the secret part of the master signing key. This is ideally you, and you only.

So, to conclude: keep the secret part of your master signing key safe!

Generating a key

The aim is to generate a digital identity that can serve to identify you and to facilitate secret communication with you in the future.

Things to consider:

  • If a valid signing subkey exists, then the master signing key is rarely used (only to sign internal parts of the key block itself, when explicitly selected, or when signing other people's keys), so the size of the signatures it generates is not a major concern.
  • Having a strong master signing key (and taking good care of it) can provide a long time span for your digital identity (possibly 10+ years) and for forward secrecy.
  • The security of RSA keys does not scale well beyond 2048 bits, use ECC (Elliptic curve cryptography) instead as recommended. Unfortunately it requires GnuPG 2.1+ (2014 Nov).
  • Longer signing keys generate longer signatures.
  • Signature length: RSA > DSA = ECDSA (Elliptic Curve DSA) (but there's more to this story).
  • Some GnuPG configuration parameters affect newly generated keys (although not in a permanent way); e.g. see setpref to set the preferred hash algorithms for identities here.

Even more thoughts here.

Using GnuPG

GnuPG properly operates with a PGP key block that is missing the secret part of its master signing key, as long as it's not needed for an operation. Therefore it's a good idea not to store the secret part of the master signing key in the regularly used gpg home directory, but rather generate and handle it in a safer environment; e.g. generate and handle it using a live CD without Internet connection, and store it on a pendrive dedicated to this purpose. Then only attach it when needed (e.g. when signing other people's keys or when your own keyblock needs to be modified).

This script generates (with defaults in parens):

  • a master signing key (RSA 4096 bit, no expiration date marked)
  • a subkey for signing (RSA 4096 bit, 3 years)
  • a subkey for encryption (RSA 2048 bit, 3 years)
  • export the secret part of the master signing key into the file secret-master-key.gpg
  • export the secret parts of the two generated subkeys into the file secret-subkeys.gpg
  • export the public parts of all the three generated keys into the file public-keys.gpg
  • generate and symmetrically encrypt a revocation certificate into the file revocation-certificate-for-[keyid]-passphrase-protected.gpg
  • (planned: support for ssss-split to generate secret sharing to backup the master key and the revocation certificate in a distributed manner)

Once the exported files have been generated, you can import them into the gpg homedir's on your devices (by default ~/.gnupg). Where you should import and what depends on the level of security you want to achieve, but keeping the master key offline is advised as described above.

(the '#' character in the output shows that the secret part of the master signing key is missing)

SmartCards and other hardware keys

SmartCards and USB cryptographic tokens are specialized simple computers that perform cryptographic operations. They are designed to keep the secret keys secret even against physical attacks. They are much more secure than storing a key on a personal computer, but they are not flawless ⁽¹⁾⁽²⁾. Usually they can store three separate keys for signing, encryption, and authentication. The secret keys can be either uploaded or generated on the cards themselves, so that they never get exposed to less secure environments.

  • The OpenPGP Card version 2.0 - a SmartCard with extensive documentation and thus stable Linux support. You can also get one by joining the FSFE Fellowship. Supports three 4096 bit keys and on-card key generation⁽¹⁾.
  • Crypto Stick - a tiny OpenSource USB computer and firmware with an integrated proprietary smart card chip. Supports OATH TOTP as described here.
  • gnuk - a portable OpenSource implementation of the OpenPGP Card specification that can run on e.g. this tiny ARM based OpenSource USB computer.

Some laptops have internal smart card readers, and higher security external readers have their own PIN entry keyboard.

Further information on using smart cards on Linux: Debian wiki, Using an OpenPGP SmartCard, OpenSC – tools and libraries for smart cards, GnuPG wiki.

Glossary

  • PGP key - It's usually a shorthand for PGP key block, which will be the case in this document, too. Not to be confused with asymmetric cryptographic keypairs, which are merely parts of PGP key blocks.
  • PGP key block - a complex structure of information (normally stored in ~/.gnupg/). Examples of the information it can contain: multiple cryptographic (sub)keys; multiple identities (email addresses, photgraphs, etc); digital signatures on various parts of the key block (potentially made by other people's keys, e.g. to communicate the belief to the rest of the world that the same real world person owns the listed digital identities, and also the secret part of the key).
  • subkey - PGP key blocks can have, among other things, multiple asymmetric cryptographic keypairs. One such asymmetric cryptographic keypair is mandatory for normal operation. It's called the master signing key, and it's used to sign various information inside the key block, e.g. identities and/or other cryptographic keys, which are called subkeys.
  • asymmetric cryptographic keypair - they are basically pairs of very big interconnected random numbers, one of them should be made public, while the other one should be kept secret. Asymmetric encryption algorithms use the public part to encrypt data and to verify signature blocks, while use the secret part to decrypt data and to generate signature blocks.
  • OATH is short for Initiative for Open Authentication. Among other things it defines a Time-based One-time Password (TOTP) authentication standard, supported by more and more websites.
  • Live CD is a bootable read-only operating system, like these security focused Linux Live CDs (bootable from USB pendrives also):
    • Liberté Linux.

Alternatives and/or further reading

Credits

Written by Attila Lendvai attila.lendvai@gmail.com (Key fingerprint: 2FA1 A9DC 9C1E BA25 A59C 963F 5D5F 45C7 DFCD 0A39).

If you've found this useful, then tips are welcome:

  • Bitcoin (BTC): 1Ej8SeMNTkwjSwhKLu7H1XLVRPZ3HUjM4J (0 BTC as of 2014-01-18)
  • Ripple (XRP): r33NEgyd7HqvrUeB98rQ4VoBxP438gC74Q (0 XRP as of 2014-01-18)
  • Paypal: (0 USD as of 2015-11-10)

The other I was trying to generate GPG key. It took really a long time and I was running out of time and losing my patience. The GPG isn’t generated even after I waited for almost an hour. I am not aware of GPG key generation process at that time, and I have never created one before. So I dig a little in Google and found out that I need to generate enough Entropy for GPG key generation process. If you are ever been in this situation, read on. It was not that difficult.

Generate Enough ‘Entropy’ For GPG Key Generation Process

I entered the following command to create a GPG key:

And, I got this message:

As you in the above command, it shows there is “no Pinentry” package.

Make sure you have installed pinentry-gtk or pinentry-qt packages.

To install this package on Arch based systems, run:

On RPM based systems:

On DEB based systems:

Then, create or edit gpg-agent.conf file:

And add one of the following lines:

Or,

Save and close the file. Reboot your system to apply the changes.

Now, let us create GPG key:

Here is where I got struck for hours. I ran this command and waited for an hour. It says I don’t have sufficient Entropy and didn’t create the key.

To create enough entropy we need to install a package called “rng-tools”.

On Arch Linux and its derivatives, run:

On RHEL and its derivatives, run:

On Debian/Ubuntu and derivatives, run:

In case the above package is not available, try to install “rng-utils” instead.

After you installed this utility, run the following command to gain enough Entropy:

Repeat the above command until you got enough Entropy to create a GPG key.

Let us check the amount of bytes of entropy currently available using command:

Generate Key Code

Sample output:

Now, try to create GPG key again. This time the GPG key generation process will be much faster.

Enter your name and mail ID and press enter.

Gpg Generate Public Key

Enter your passphrase:

Merely get this product and set up it on PC or Mac system for higher end result. Forza horizon 2 cd key generator generate serial key.

Re-enter passphrase:

Success! The GPG key has been created.

Hope this helps.

Thanks for stopping by!

Help us to help you:

  • Subscribe to our Email Newsletter : Sign Up Now
  • Support OSTechNix : Donate Via PayPal
  • Download free E-Books and Videos : OSTechNix on TradePub
  • Connect with us: RedditFacebookTwitterLinkedInRSS feeds

Create Gpg Key

Have a Good day!!

Gpg Generate Key Long Time Free

Share