GPG with ECC and Subkeys
1 Cryptology with OpenPGP and GPG
2 PGP public keys
My GPG Key: [email protected]
GPG is practically the standard for encryption for Linux users. If Elliptic Curve Cryptography (ECC) is used instead of the typical RSA, it is supposed to be even more secure. Unfortunately its interface and documentation aren't user-friendly. This is a record of how I arrived to a relatively secure GPG setup, as reference for other non-specialists who are familiar with UNIX. Brief technical, historical and mathematical background is given. I have some personal history with the mathematical theory of elliptic curves but was never a cryptographer. So, mathematicians who are not well-versed in Linux technicalities may find this documentation useful, as may Linux users who want to use ECC for secure GPG but do not want to get into the mathematical and algorithmic specifics.
2.1 Public Key Cryptography
The schema of public key cryptography to reliably send and verify messages is as follows.