Sharing Encryption Keys: A Practical Example With GPG (2024)

Security and Compliance

ProgressBlogs Sharing Encryption Keys: A Practical Example With GPG

by Koen Van Impe

Posted on April 08, 2016 0 Comments

Sharing Encryption Keys: A Practical Example With GPG (1)

Sharing Encryption Keys: A Practical Example With GPG (2)

Encryption keys are considered the key to the kingdom, both from a server-, service- and user-oriented approach. One of the most popular solutions for encryption keys is GnuPG, an implementation of the OpenPGP standard for encrypting and signing data and communication. GPG uses public-private keys, wherein you distribute your public key and protect your private key by all possible means.

You do not want to store your private key on your workhorse, and definitely not together with the data it has to protect. Ideally, you store it offline. Know what works best? Paper! Print the key and store it in a safe vault. But if you do kick it new school, use a removable USB drive.

You can use the armored option from GPG or a tool like paperkey.

$ gpg --export-secret-key --armor

Sub-Keys Instead of Private Keys

When the private key isn't available on your system, how do you sign or encrypt data? By creating sub-keys with an expiration date. As with a normal private key, you should store these keys safely but accessible to you — in an encrypted container or a keychain, for example.

One of the basic security precautions when using GPG (or any other key-based system) is setting a strong passphrase before you can use the secret key. Remember, the algorithms for encrypting data usually suffice. The security comes from the encryption keys and how they are protected.

gpg --edit-key

gpg>

gpg> save

How do you share these keys with team members? If you set a strong passphrase for the secret key, you can:

  • Send it via e-mail.
  • Use a secure upload mechanism (sftp) to a protected storage.

For additional security, encrypt the e-mail or the uploaded file with the public key of the recipient.

Sharing the passphrase for the shared key via the same communication you used to transmit the key is not a good idea. It should rather happen out-of-bands. Choose a communication channel that's secure, one-on-one and where you can verify the recipient.

A simple solution? Pick up the phone, verify you're talking to the intended recipient and share the password via voice-communication. An added benefit is that you get to know the person who will be using your keys. It doesn't scale well to large teams, but it works with most environments.

Managing Keys with KMIP

What do you do if you have to integrate multiple systems from different vendors? Manually exchanging keys becomes very cumbersome. This is where Key Management Interoperability Protocol (KMIP) comes in. This protocol is governed by the OASIS standards body for the storage and maintenance of key, certificate, and secret objects.

Keep in mind there is a Python implementation at GitHub, called PyKMIP, that allows you to set up a client/server model. Get it via:

$ git clone https://github.com/OpenKMIP/PyKMIP.git

Revoking Keys

Something that is often overlooked is having a procedure for revoking keys. Keys can get compromised. Keyholders can leave your organization. You want to be prepared when this stuff happens. For starters, an authorized staff member should be able to issue revocation certificates. Ideally these are already generated when creating the key and then stored somewhere safe. After revocation, however, the authorized user should access the private key and generate new sub-keys.

Generating GPG revocation certificates is easy:

$ gpg --output revoke.asc --gen-revoke

Backup Your Private Keys

You probably take good care of your data with test backup procedures. The same goes for the private keys. It stinks when sub-keys go missing, but you can revoke them and generate new ones. To do so you'd still need the private key, so make sure your backup is also extended to these keys. Be sure to test this procedure before an incident occurs.

Accountability

Logging service requests is essential. Likewise, you need to have an audit trail of who used which key, where and why.

Koen Van Impe

View all posts from Koen Van Impe on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.

Next:

  • 5 Key Considerations When Using PGP Encryption in File Transfer

Comments

Comments are disabled in preview mode.

Follow us viaRSS Feed

Topics
  • Application Development
  • Mobility
  • Digital Experience
  • Company and Community
    • DataDirect
    • MarkLogic
    • Semaphore
  • Security and Compliance
  • Infrastructure Management

Sitefinity Training and Certification Now Available.

Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.

Learn More

More From Progress

Sharing Encryption Keys: A Practical Example With GPG (3)

Catching Up with Our Scholarship Series Recipients

Sharing Encryption Keys: A Practical Example With GPG (4)

Progress Managed Database Is More Than A Monitoring Package

Sharing Encryption Keys: A Practical Example With GPG (5)

New Digital Challenges, New Me: Meet Sitefinity DX 14.0

Latest Stories
in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Sharing Encryption Keys: A Practical Example With GPG (2024)
Top Articles
Is it Worth it to be an Uber Driver?
Steps to Claiming an Elderly Parent as a Dependent
Craigslist Livingston Montana
Why Are Fuel Leaks A Problem Aceable
Kreme Delite Menu
Was ist ein Crawler? | Finde es jetzt raus! | OMT-Lexikon
FFXIV Immortal Flames Hunting Log Guide
Culver's Flavor Of The Day Wilson Nc
Sissy Transformation Guide | Venus Sissy Training
Craigslist Furniture Bedroom Set
Computer Repair Tryon North Carolina
Wmlink/Sspr
Buckaroo Blog
A.e.a.o.n.m.s
Ave Bradley, Global SVP of design and creative director at Kimpton Hotels & Restaurants | Hospitality Interiors
Syracuse Jr High Home Page
6th gen chevy camaro forumCamaro ZL1 Z28 SS LT Camaro forums, news, blog, reviews, wallpapers, pricing – Camaro5.com
Darksteel Plate Deepwoken
I Wanna Dance with Somebody : séances à Paris et en Île-de-France - L'Officiel des spectacles
Walmart Windshield Wiper Blades
Char-Em Isd
Find Such That The Following Matrix Is Singular.
Rachel Griffin Bikini
Nhl Wikia
Craigslist In Flagstaff
Union Ironworkers Job Hotline
Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
Georgetown 10 Day Weather
Great Clips Grandview Station Marion Reviews
Mega Personal St Louis
Craigslist Roseburg Oregon Free Stuff
Reser Funeral Home Obituaries
Prot Pally Wrath Pre Patch
Hesburgh Library Catalog
Jesus Revolution Showtimes Near Regal Stonecrest
Soul Eater Resonance Wavelength Tier List
1773x / >
Motorcycle Blue Book Value Honda
Pixel Combat Unblocked
Martin Village Stm 16 & Imax
Mississippi State baseball vs Virginia score, highlights: Bulldogs crumble in the ninth, season ends in NCAA regional
Unlock The Secrets Of "Skip The Game" Greensboro North Carolina
Boggle BrainBusters: Find 7 States | BOOMER Magazine
Vision Source: Premier Network of Independent Optometrists
The best specialist spirits store | Spirituosengalerie Stuttgart
LoL Lore: Die Story von Caitlyn, dem Sheriff von Piltover
Quaally.shop
The Horn Of Plenty Figgerits
Who uses the Fandom Wiki anymore?
Urban Airship Acquires Accengage, Extending Its Worldwide Leadership With Unmatched Presence Across Europe
Ciara Rose Scalia-Hirschman
Dinargurus
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 5669

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.