OpenPGP Key Properties
The descriptions in this section apply to all OpenPGP keys.
To view properties of a PGP key:
- Selecciatz la clau PGP dins la fenèstra principala,
- Double click on it or choose Properties from the toolbar,
- Select the Details tab.
- 5.1. Propietats
- 5.2. Trust
- 5.3. Activar e desactivar de claus
- 5.4. Expiration Date
- 5.5. User IDs
- 5.6. Photo IDs
- 5.7. Changing the Passphrase
- 5.8. Suprimir una clau
- Fingerprint
-
The fingerprint is a unique string of characters that exactly identifies a key.
- KeyID
-
The KeyID is similar to the Fingerprint. However the KeyID only contains the last 8 characters of the fingerprint. Most of the time it is possible to identify a key with only the KeyID, but occasionally two keys may have the same ID.
- Tipe
-
Specifies the encryption algorithm used to generate a key. DSA keys can only sign. ElGamal keys are used to encrypt.
- Creat
-
Indicates the date the key was created.
- Expires
-
Indicates the date the key can no longer be used.
- Strength
-
Indicates the length in bits of a key. In general the longer the key, the more security it provides.
A long key is not enough to make up for the use of a weak passphrase.
5.2. Trust
Trust is an indication of how sure you are of a person's ability to correctly extend the web of trust. When you are faced with a key you have not signed, the validity of that person's key will be determined based on the signatures they have collected and how well or not you trust the people who have made those signatures. By default, an unknown key will require 3 signatures with marginal trust value or 1 fully trusted signature.
- Unknown: You are not familiar with the person's ability to sign keys correctly.
- Never: This person cannot correctly sign keys.
- Marginal: This person checks for photo ID before signing a key, but does not necessarily scrutinize the IDs.
- Full: This person scrutinizes each and every person's photo IDs before signing them (e.g. they only sign keys that truely belong to the person asking for the signature).
- Ultimate: This level of trust should only be assigned to your own keys.
5.3. Activar e desactivar de claus
When a key is enabled, it can be used to perform encryption operations. When a key is disabled, it cannot be used to encrypt to or verify signatures made by it.
5.4. Expiration Date
A key can no longer be used to perform key operations after it has expired. Changing a key's expiration date to a point in the future re-enables it. A good general practice would be to have a master key that never expires and multiple subkeys that do and are signed by the master key.
5.5. User IDs
User IDs allow multiple identities and email addresses to be used with the same key.
They usually take the form of:
Name (comment) <email address>
- 5.5.1. Adding a User ID
5.5.1. Adding a User ID
Adding a user ID is useful when you want to have an identity for your job and one for your friends.
To add a user ID to a key:
- Seleccionatz la clau dins la fenèstra principala,
- Double click on it or choose from the toolbar,
- Select the Names and Signatures tab,
- Clicatz sus .
After following the instructions above, you will be presented with a dialog to fill in. The fields are detailed below.
- Nom complet
-
Enter your full name in the form
A middle name or initial is optional.<first> <last>
You must enter at least 5 characters in this field.
- Adreça electronica
-
Your email address is how most people will locate your key on a key server or other key provider. Make sure it is correct before continuing.
It should be of the form
<username>@<domainname>
- Comentari de clau
-
The comment field can be used to place any additional information into the displayed name of your new ID. This information can be searched for on key servers.
5.6. Photo IDs
Photo IDs allow a key owner to embed one or more pictures of themselves in a key. These identities can be signed just like normal user IDs. A photo ID must be in JPEG format and is recommended to be no larger than 240x288 pixels.
If the chosen image is not of the required file type or size Passwords and Encryption Keys can resize and convert it on the fly from any image format supported by the GDK library.