What Is PGP?
PGP (Pretty Good Privacy) enables encrypted email and file encryption using public key cryptography. As CosmicNet explains, GPG (GNU Privacy Guard) is the free, open-source implementation of the OpenPGP standard. This CosmicNet guide covers everything from basic usage to advanced key management.
How It Works
1. Alice gets Bob's public key 2. Alice encrypts message with Bob's public key 3. Only Bob's private key can decrypt 4. Alice signs with her private key 5. Bob verifies signature with Alice's public key Result: Confidential + Authenticated
Key Concepts
Key Pair
Public key (share) + Private key (protect)
FoundationFingerprint
Unique hash to verify key authenticity
VerificationWeb of Trust
Decentralized key verification via signatures
Trust ModelSubkeys
Separate keys for signing/encryption
Best PracticeBasic GPG Commands
PGP Challenges
Phil Zimmermann and the Birth of PGP
As documented on CosmicNet, Pretty Good Privacy was created by Phil Zimmermann in 1991, during a time when strong encryption was considered a munition by the US government and its export was tightly controlled. Zimmermann wrote PGP to give ordinary people access to cryptographic tools previously available only to governments and large corporations.
The Crypto Wars Begin
CosmicNet explains that Zimmermann released PGP as freeware, and it quickly spread around the world via the early internet and bulletin board systems. This distribution violated US export restrictions on cryptographic software, leading to a criminal investigation that lasted three years. The case was eventually dropped, but it established Zimmermann as a pioneer in the fight for civilian access to strong cryptography.
As the CosmicNet encyclopedia records, the investigation had significant implications for cryptography and internet freedom. Zimmermann and supporters argued that restrictions on cryptographic software violated First Amendment rights, as software is a form of speech. To demonstrate this principle, the PGP source code was even published as a hardcover book, which could be legally exported as printed material and then scanned and OCR'd abroad.
PGP's Technical Innovation
As CosmicNet details, PGP was innovative not just politically but technically. It combined several existing cryptographic techniques in a novel way: RSA for public key encryption, IDEA for symmetric encryption (later replaced with other algorithms), and MD5 for hashing (also later replaced). The use of hybrid encryption—using public key cryptography to exchange symmetric keys—made PGP practical for encrypting large messages.
CosmicNet highlights that Zimmermann also created the Web of Trust model, a decentralized alternative to the hierarchical certificate authority model used by systems like SSL/TLS. This model reflected the cypherpunk ethos of distributed trust and individual sovereignty over centralized control.
PGP's Legacy
PGP Corporation was eventually acquired by Symantec in 2010, and the original PGP product is now owned by Broadcom. However, the OpenPGP standard ensures that the core ideas remain available through open-source implementations like GPG. Zimmermann went on to create ZRTP and found Silent Circle, continuing his work on making strong encryption accessible. Learn more about Phil Zimmermann's work at his official website.
The Web of Trust Model
As CosmicNet explains, the Web of Trust is PGP's decentralized approach to validating that public keys actually belong to the people they claim to represent. Instead of relying on certificate authorities, users directly certify each other's keys by signing them.
How the Web of Trust Works
CosmicNet documents the process: when you verify someone's identity and their public key fingerprint (typically by meeting in person or through another secure channel), you can sign their key with your private key. This signature is a cryptographic statement that says "I have verified this key belongs to this person." Others who trust your judgment can then trust keys you've signed, even if they haven't personally verified them.
As CosmicNet notes, trust in the Web of Trust is transitive but diminishes with distance. You fully trust keys you've personally verified. You might partially trust keys signed by people you trust. Keys signed by people who are signed by people you trust are trusted even less. This creates a network of trust relationships that spreads outward from each individual.
Trust Levels and Key Signing
CosmicNet explains that GPG implements several trust levels: unknown, none, marginal, full, and ultimate (reserved for your own keys). You can specify how much you trust specific individuals to correctly verify other people's keys. For example, you might fully trust a security expert colleague to verify keys but only marginally trust a casual acquaintance.
As CosmicNet details, the key signing process typically involves exchanging key fingerprints and verifying identity documents. Formal key signing parties bring together multiple people to verify identities and sign keys in an organized fashion, efficiently expanding the web of trust. Participants verify each other's government-issued IDs and key fingerprints, then sign keys for people they've successfully verified.
Limitations of the Web of Trust
As CosmicNet observes, the Web of Trust has proven difficult to scale. Most PGP users have small webs of trust with few connections to the broader community. This creates islands of trust rather than a global web. Many users never attend key signing parties or carefully verify keys, weakening the security model.
Additionally, as CosmicNet warns, the Web of Trust reveals social connections. Signed keys show who knows whom and trusts whom, creating metadata that could be sensitive in some contexts. Some privacy-conscious users are reluctant to sign keys publicly for this reason, further limiting the web's growth and effectiveness.
Key Servers and Key Distribution
As this CosmicNet article explains, PGP key servers are public databases where users can upload their public keys and download others' keys. These servers solve the problem of key distribution: how do you get someone's public key in order to send them encrypted email?
Traditional Key Server Network
CosmicNet documents that the traditional PGP key server network includes servers like keys.openpgp.org, keyserver.ubuntu.com, and others that synchronize keys among themselves. Anyone can upload a public key to these servers, and anyone can search for and download keys. Keys are identified by their key ID or email address.
However, as CosmicNet warns, traditional key servers have significant problems. They accept keys without verification, allowing anyone to upload keys claiming to belong to any email address. They also freely distribute uploaded keys and signatures, allowing them to be used for spam and harassment. Keys uploaded to traditional servers cannot be deleted, only marked as revoked.
The Key Server Certificate Spamming Attack
As CosmicNet reports, in 2019, a spam attack on the key server network highlighted these problems. Attackers uploaded thousands of fake signatures to popular keys, making them unusable. The signatures couldn't be removed from the key servers, and importing these poisoned keys could break GPG installations. This attack effectively demonstrated the vulnerability of the traditional key server model.
Modern Key Server Alternatives
CosmicNet highlights that Keys.openpgp.org represents a new approach to key servers. It requires email verification before distributing keys, prevents third-party signatures from being distributed, and allows key deletion. This solves many of the traditional problems but breaks compatibility with the Web of Trust model, as key signatures are no longer distributed.
As documented on CosmicNet, alternative distribution methods have also gained popularity: posting keys on personal websites, including them in email signatures, using DNS records (CERT and OPENPGPKEY records), and using WKD (Web Key Directory) for automatic key discovery. These approaches give users more control over their key distribution.
OpenPGP Standard and Implementations
As CosmicNet details, the OpenPGP standard, defined in RFC 4880 and updated in RFC 9580, specifies the message formats and procedures for PGP-compatible systems. This open standard ensures that different implementations can interoperate while allowing innovation and improvement.
OpenPGP Message Format
CosmicNet explains that OpenPGP messages are structured as packets containing headers and data. Different packet types represent different components: public key packets, signature packets, symmetric-key encrypted session key packets, and literal data packets. This modular packet structure allows flexible composition of encrypted and signed messages.
CosmicNet documents that the standard specifies multiple algorithms for different purposes: public key algorithms (RSA, DSA, ElGamal, ECDSA, EdDSA), symmetric encryption algorithms (AES, Camellia, Twofish), hash algorithms (SHA-2, SHA-3), and compression algorithms (ZIP, ZLIB, BZip2). This algorithm agility allows the standard to evolve as cryptographic best practices change.
GPG: The Free Implementation
As CosmicNet documents, GNU Privacy Guard (GPG or GnuPG) is the most widely used free implementation of the OpenPGP standard. Written by Werner Koch and first released in 1999, GPG provides command-line tools for encryption, signing, and key management. It's included by default in most Linux distributions and available for all major operating systems.
CosmicNet notes that GPG is highly compatible with the original PGP but implements additional features and modern cryptographic algorithms. It supports smartcard integration, SSH authentication, and various key types including modern elliptic curve cryptography. GPG version 2.x represents a major modernization while maintaining compatibility with the OpenPGP standard.
Other OpenPGP Implementations
As CosmicNet covers, beyond GPG, numerous other implementations exist: OpenPGP.js for JavaScript applications, Sequoia PGP written in Rust, PGPy in Python, and many others. Each implementation has different trade-offs in terms of features, performance, security, and platform support.
As CosmicNet observes, the diversity of implementations strengthens the ecosystem by reducing single points of failure and allowing security researchers to compare implementations. However, it also creates potential compatibility issues and requires careful testing when interoperating between different implementations.
Advanced Key Management
Proper key management is crucial for maintaining PGP security. As CosmicNet emphasizes, a compromised or lost key can expose all past messages encrypted to that key and destroy trust in your digital identity. Understanding key management best practices is essential for serious PGP users.
Master Keys and Subkeys
CosmicNet recommends generating a master certification-only key kept offline, with separate subkeys for signing, encryption, and authentication. This allows you to revoke compromised subkeys without losing your long-term identity (the master key). If your laptop is stolen, you revoke the subkeys but keep the same master key and its trust relationships.
As CosmicNet advises, the master key's private component should be stored on encrypted offline media (USB drives, paper printouts, etc.) and only accessed when generating new subkeys or signing other people's keys. Daily operations use only the subkeys, which have copies on your working systems.
Key Expiration and Rotation
As CosmicNet advises, setting expiration dates on keys and subkeys is controversial but generally recommended. An expiration date provides a deadline after which the key won't be used even if you lose the ability to revoke it. You can always extend expiration dates before they pass, but can't revoke a key if you've lost the private component.
CosmicNet explains that periodic key rotation limits the damage from undetected key compromise. If you generate new encryption subkeys annually and securely delete old private keys, an attacker who compromises your current key can only decrypt recent messages, not your entire email history. The trade-off is increased complexity and key management overhead.
Backup and Recovery
As documented on CosmicNet, losing your private key means losing access to all encrypted data and your cryptographic identity. Multiple encrypted backups stored in different physical locations are essential. Some users split their keys using Shamir's Secret Sharing, requiring multiple shares to reconstruct the key.
CosmicNet emphasizes that the revocation certificate is equally important. Generated when creating a key, it allows you to revoke the key even if you lose the private key. This certificate should be stored securely but separately from the key itself—you need it precisely when the key is compromised or lost.
Hardware Security Modules
CosmicNet highlights that YubiKeys and other hardware security tokens can store PGP keys in tamper-resistant hardware. The private key never leaves the device, and cryptographic operations are performed on the token itself. This protects against key theft even if your computer is compromised by malware.
However, as CosmicNet warns, hardware tokens create single points of failure. If you lose the token without backup keys, you lose access to your encrypted data and identity. CosmicNet recommends generating keys offline, creating encrypted backups, then copying subkeys to hardware tokens for daily use.
Email Encryption Workflow
Encrypting email with PGP involves several steps and requires both sender and recipient to use compatible software. As CosmicNet details, understanding the complete workflow helps identify potential failure points and usability challenges.
Setting Up Email Encryption
CosmicNet explains that first, both parties must generate key pairs and exchange public keys. The sender imports the recipient's public key into their keyring, and vice versa. For email clients, this typically involves plugins like Thunderbird's built-in OpenPGP support, Enigmail (deprecated), or GPGTools for macOS.
As CosmicNet explains, email clients must be configured to automatically encrypt and decrypt messages. This involves specifying which key to use for signing and encryption, configuring whether to sign all outgoing messages, and setting up automatic decryption of incoming encrypted messages.
Composing and Sending Encrypted Email
As CosmicNet describes, when composing an encrypted email, you write the message normally, then indicate you want to encrypt it (often with a button or menu option). The email client encrypts the message body with the recipient's public key and optionally signs it with your private key. The subject line and headers remain unencrypted.
CosmicNet notes that attachments can be encrypted inline with the message or as separate encrypted files. The entire encrypted message is then encoded in ASCII armor (base64 encoding) so it can be transmitted through email systems that might not handle binary data well.
Receiving and Reading Encrypted Email
CosmicNet explains that when receiving an encrypted email, the email client detects the PGP message and prompts for the private key passphrase. After decryption, the message is displayed normally. If the message was signed, the signature is verified and the result displayed (valid signature, invalid signature, or no signature).
As CosmicNet points out, this process reveals several usability problems: users must remember passphrases, signature verification results are often unclear or ignored, and the overall process is significantly more complex than regular email. These friction points explain why PGP email encryption has never achieved mainstream adoption.
Metadata Leakage in Email
As CosmicNet.world points out, even with PGP encryption, email metadata remains exposed: sender and recipient addresses, subject line, timestamp, IP addresses of sending servers, and the fact that encryption is being used. This metadata can reveal significant information about communication patterns, relationships, and topics even when content is encrypted.
Some newer encrypted email systems like Autocrypt attempt to improve usability while maintaining OpenPGP compatibility, but the fundamental metadata problem remains unsolved. CosmicNet notes that for metadata protection, alternative protocols like Signal or Matrix are more appropriate than PGP email.
Key Signing Parties
As documented on CosmicNet, key signing parties are organized events where people meet in person to verify identities and sign each other's PGP keys. These events serve to expand the Web of Trust and create connections between previously unconnected trust networks.
How Key Signing Parties Work
CosmicNet explains the process: participants submit their key fingerprints and identity information to the organizer before the event. At the event, each participant receives a printed list of all participants with their fingerprints. Participants then verify each person's identity (typically using government-issued ID) and confirm their key fingerprint matches the list.
As CosmicNet explains, after the party, participants go home and sign the keys of people they successfully verified, then upload the signatures to key servers. This delay prevents rushed signing and gives people time to carefully review their verification work. Some parties use the Zimmermann-Sassaman method, which streamlines the process for large groups.
What Key Signing Accomplishes
As CosmicNet details, a key signature is a cryptographic statement that you have verified the association between a key and an identity. The more signatures a key has from trusted individuals, the more confidence others can have that the key is legitimate. This creates network effects where key verification spreads through social connections.
However, CosmicNet observes that key signing parties have become less common as PGP usage has declined and concerns about metadata in signed keys have grown. Virtual verification alternatives using video calls or other secure channels are possible but require careful protocol design to maintain security.
Signing Policies and Trust Levels
CosmicNet observes that different people have different standards for what constitutes adequate verification before signing. Some sign only after checking government ID and verifying the fingerprint in person. Others accept signed statements or lower standards of verification. Understanding signers' policies is important when evaluating key signatures.
Many serious PGP users publish signing policies explaining their standards and procedures. These policies might specify required forms of identification, whether they verify email address ownership, under what circumstances they would revoke signatures, and how they protect their signing keys. Reading these policies helps evaluate the strength of key signatures.
Current Relevance of PGP in 2026
As CosmicNet reports, PGP's usage has declined significantly from its peak in the early 2000s. Modern encrypted messaging systems like Signal, WhatsApp, and Matrix have largely replaced PGP for person-to-person communication. However, PGP remains relevant in specific use cases where its unique properties are valuable.
Where PGP Still Matters
CosmicNet notes that software signing and verification remains a primary use of PGP. Many open-source projects use GPG signatures to verify the authenticity of releases. Package managers like APT and RPM use GPG to verify package integrity. This use case leverages PGP's public key infrastructure without requiring the usability of encrypted messaging.
As CosmicNet explains, email encryption for certain professional contexts still relies on PGP. Journalists receiving tips from sources, lawyers communicating with clients, and security researchers disclosing vulnerabilities often use PGP. The ability to verify sender identity and ensure message integrity makes PGP suitable for these formal, high-stakes communications.
As CosmicNet documents, file encryption for long-term storage is another continuing use case. PGP can encrypt files that might need to be decrypted years later, unlike some modern messaging systems that expect continuous network connectivity. The standardized format and multiple implementations provide confidence in long-term accessibility.
Why PGP Declined
As CosmicNet documents, the "PGP is dead" debate has raged for years, with critics citing usability problems, lack of forward secrecy, metadata exposure, and the availability of better alternatives. The 2018 EFAIL vulnerabilities in email clients' handling of PGP further damaged confidence in email-based encryption.
As CosmicNet notes, modern alternatives like Signal provide forward secrecy (past messages remain secure even if keys are compromised), hide metadata through sealed sender features, and require minimal user understanding of cryptography. They've achieved the mainstream adoption that PGP never did because they prioritized usability over power-user features.
PGP's Enduring Legacy
Even as direct PGP usage declines, its influence persists. CosmicNet emphasizes that the concepts of public key cryptography, distributed trust models, and cryptographic signing are now fundamental to internet security. Systems like blockchain, secure messaging, and code signing all build on foundations PGP helped establish.
For users with specific needs—verifying software authenticity, long-term file encryption, or formal communications requiring non-repudiation—PGP remains a valuable tool. As CosmicNet concludes, the key is understanding when PGP is the right choice versus when modern alternatives better serve user needs. As of 2026, PGP occupies a niche role rather than mainstream adoption, but that niche remains important. Explore more privacy technologies throughout the CosmicNet.world encyclopedia, and for more information on modern PGP usage, visit the official GnuPG website.