PGP Suite

Options

Required
Required
Required
Required
Required
Passphrase: What is this?
Click here to regenerate another pair of key

Your Private Key


Your message




Signer's Public Key


Your message




Only pub for simply encryption, priv + pub for sign + encrypt.


Reсeiver's Public Key



Signer's Private Key (signing)



Your message




Signed and encrypted message

Only priv for simply decryption, priv + pub for decrypt & verify signature.


Receiver's Private Key (decryption)



Signer's Public Key



Encrypted message




Yes, it is as safe as generating your keys using a local application. The key generation on this website is done client-side only. This means the key pairs are generated entirely in your web browser and they never leave your computer. This website never sees any key related data or the key itself.
Sure. For starters, it enforces using a passphrase with each key generated. This ensures some level of protection if your key is ever stolen. It also automatically generates two subkeys for you, one for signing and the other for encryption. You can use your subkeys to sign and encrypt data and keep your private key safe. The bit length of generated subkeys will be identical to the length you specified for the primary key. The primary key it generates for you never expires. You can, however, set the expiration date on the generated subkeys using the 'Expire' option in the key generation form.
Elliptic Curve Cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size. For example, a 256-bit ECC public key should provide comparable security to a 3072-bit RSA public key. ECC is still not widely supported in many PGP client applications so I advise that you generate ECC keys only if you know what you're doing. You can read more about it at RFC 6637.
PGP key generation is a resource intensive process. As a result, your may experience increased CPU and memory usage on your device, which can result in performance issues. The performance impact depends on the hardware capabilities of your device.
For PGP keys to work with PGP Suite, they require SSH Authentication so PGP Suite can then use them, this is usually done when the key is generated. PGP Suite automatically adds SSH Authentication to generated PGP Suite keys.
PGP Suite is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP Suite supports both message and file signing and encryption.

PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991. PGP and similar software follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data. Source: Wikipedia

This site only provides a simple and easy to use tool for people to generate PGP keys with. Today, the common methods for generating keys still involve going to a command prompt of a Linux/Unix machine and using the GPG utility, or installing a PGP compatible application on your desktop. I wanted to provide an easier way to generate keys. None of this would be possible without the awesome Open Source software I'm utilizing. I'm using KeyBase's awesome JavaScript implementation of PGP (kbpgp). For file saving capabilities I am utilizing Eli Grey's wonderful FileSaver.js interface.

This project is a fork of Heiswayi Nrird's PGP Suite. Matej Ramuta forked it and added message encryption and decryption.
TheChiefMeat added sign only mode, sign+encrypt mode as well as support for 8192 RSA keys.
username1565 Added PGP key verification, file selection as well as program icons, file uploading and downloading for textareas, notify message, and base64 encoding for files.

This site is Open Source and the source code are available on GitHub:

You can find an offline version here, maintained by TheChiefMeat.

If you have any inquiry or problem, you may create an issue here (heiswayi) or here (ramuta).