Options

Required
Required
Required
Required
Required
Passphrase: What is this?
Click here to regenerate another pair of key

Your Private Key


Your Message in Plain Text




Signer's Public Key


PGP-signed Message




Reсeiver's Public Key



Signer's Private Key (For signing purpose)



Your Message in Plain Text




Encrypted PGP Message

Receiver's Private Key (For decryption purpose)



Signer's Public Key



Encrypted PGP Message




Decrypted Message in Plain Text

Absolutely, it's as secure as creating your keys using local software. The process of key generation on this website is exclusively client-side. This implies that the key pairs are entirely generated within your web browser and they never get transmitted from your computer. This website doesn't have access to any key-related data or the key itself.
Certainly. Initially, the program mandates the use of a passphrase for every key that is generated. This provides a certain degree of protection in case your key is compromised. Additionally, it auto-generates two subkeys for you, one dedicated to signing and the other for encryption. These subkeys can be utilized to sign and encrypt data, allowing you to keep your private key secure. The bit length of the generated subkeys will match the length you set for the primary key. The primary key that is generated for you has no expiration date. However, you have the option to set an expiration date for the generated subkeys using the 'Expire' option in the key generation form.
Elliptic Curve Cryptography (ECC) is a public-key cryptographic method that leverages the algebraic structure of elliptic curves over finite fields. One of its primary advantages over non-ECC cryptography, which uses plain Galois fields, is that it offers equivalent security with smaller key sizes. For instance, a 256-bit ECC public key is expected to provide security comparable to a 3072-bit RSA public key. However, ECC is not yet broadly supported across all PGP client applications, so it's recommended to generate ECC keys only if you're confident in your understanding of their usage. For more information, refer to RFC 6637.
The process of PGP key generation is quite demanding on system resources. Consequently, you might notice a surge in CPU and memory utilization on your device, potentially leading to a slowdown in performance. The extent of this impact is largely contingent on the hardware specifications of your device.
Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991. PGP and similar software follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data. Source: Wikipedia

This website offers a straightforward and user-friendly tool for generating PGP keys. Traditional methods for key generation often require the use of a command prompt on a Linux/Unix machine with the GPG utility, or the installation of a PGP compatible application on your desktop. Our aim is to simplify this process. This wouldn't be achievable without the invaluable Open Source software we're leveraging. We're utilizing KeyBase's excellent JavaScript implementation of PGP (kbpgp) and Eli Grey's efficient FileSaver.js interface for file saving capabilities.

This website is Open Source and its source code is accessible on GitHub, licensed under the MIT license.