Knowledge base PGP Keys
PGP (Pretty Good Privacy) is a system that allows digital signatures and encryption. It is typically used for email. There is a wikipedia article on PGP which explains some of the history.
The basic principle of PGP is that you personally get yourself a key. This is conceptually much like a real key - it locks and unlocks things in effect. The thing is that the key is yours and yours alone.
There are a number of applications that let you use PGP, and one of the common ones is to use it for email. This then lets you digitally sign your emails using your key so that the recipient knows it is from you and has not been changed in any way. This also lets people encrypt email to you which only your key can unlock - i.e. nobody else can ever read the contents of the email.
How to use PGP
We recommend Thunderbird as an email client. You can install a plug-in to Thunderbird called Enigmail which allows you to handle PGP emails.
Making a key
The first stage when using PGP is to make your own key. This is stored on your computer but can be copied to other computers you use. The key will usually have your name and email associated with it. Enigmail takes you through these initial stages step by step. The secret key is protected by a pass phrase. This is a long password that you can easily remember but is long enough to be hard for someone else to guess. Never tell anyone your pass phrase or disclose your secret key.
You can set Enigmail to sign all emails, or emails to certain people or only when you select it. Many people do not have tools to handle signed emails, so will see extra junk on your signed emails, but people usually manage to ignore this and read the content of the email anyway.
To sign an email needs your secret key and you are asked for your pass phrase when the email is sent. This proves the email is from you and not just someone using your computer or email address.
To encrypt an email to send to someone you need their key (not yours). Don't worry, you don't actually get their secret key which I said you must never disclose, you get what is called their public key. This is a key that lets you lock your email to them so that only their secret key and pass-phrase can open it. You can get public keys from key servers and Enigmail provides tools to get people's keys. You can also upload your public key to the key-server so people can get it to send encrypted emails to you. However, there is no immediate way to know someone's key is in fact theirs and not simply someone who made a key with the same name and email address (see Trust).
You can encrypt an email for several people and any of them can read it. However, once encrypted, nobody else can read the email (not even you). There is an option to always encrypt emails for yourself too so you can at least read your sent emails.
If you receive an encrypted email you will need to enter your pass-phrase. Only with your secret key and your pass-phrase can you read an email encrypted for you.
One of the big issues with any system for associating an identity with a person (e.g. a PGP key with a real person) is proving that link. How do you know someone is who they say they are. How do you know that someone's key is theirs.
All keys have a fingerprint which is easy enough to read out over the phone or check on a business card, etc. This is one way to check a key is genuine. You can then tell the key management software you trust the key to be genuine.
It is also possible to say that you trust someone to sign other keys. For example, if you trust the Andrews & Arnold Ltd company key to sign other keys, then any of our staff keys will immediately appear to be valid when you download them from a key server because the key itself is digitally signed by the Andrews & Arnold Ltd company key.
Even without knowing someone is who they say they are PGP provides a key factor for communications - consistency. If you have been exchanging signed emails with someone called Fred Bloggs for years, then that is in effect who they are from your point of view. If they send an email with the same key as always, it is the same person you communicated with last time.
Should you sign all emails?
Do you sign all letters you send? The usual answer is yes, so why not sign all emails you send. If nothing else this helps establish that you are the same person that sent all the emails over a period of time. The only downside is that some people don't have the tools to check signatures and see extra junk on the email you sent. This can be particularly unpopular on mailing lists, so you may want to refrain from signing emails where the recipient finds it annoying - or possibly only sign emails to those that can cope with it.
Should you encrypt all emails where possible?
You can only encrypt an email to someone if you have their public key which generally means they can handle encrypted emails. If they can handle them, why not always encrypt them? Bear in mind some people have email on mobile phones, and other applications where maybe they cannot read the encrypted email so this may be less than ideal in some case.
There is however a good argument for encrypting as much as possible. It helps dilute the idea that encrypted emails means you have something to hide. After all, nobody says using opaque envelopes means you have something to hide, and people would not want all of their personal letters sent in clear envelopes. If encrypting email is routing then it makes invasion of privacy harder generally. Privacy is a basic human right and we should do everything we can to stop its erosion.