Helping people with computers... one answer at a time.

You can use my PGP/GPG public key to encrypt something you send me, or verify something I've signed.

I want to verify something that you've signed, what's your public key?

You can actually get my public key (for leo<at>pugetsoundsoftware.com) from several key PGP/GPG servers out there, but for the record, here 'tis:


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.0 (MingW32)
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=0j0h
-----END PGP PUBLIC KEY BLOCK-----

Using this you can encrypt something such that only I can decrypt it, and you can validate that something that's claimed to be signed by me a) is, and b) hasn't been tampered with.

Article C1822 - January 2, 2003 »

Share this article with your friends:

Share this article on Facebook Tweet this article Email a link to this article
Leo Leo A. Notenboom has been playing with computers since he was required to take a programming class in 1976. An 18 year career as a programmer at Microsoft soon followed. After "retiring" in 2001, Leo started Ask Leo! in 2003 as a place for answers to common computer and technical questions. More about Leo.

Not what you needed?

4 Comments
Robert Earl Hazelett
May 27, 2009 10:16 AM

Leo,

Nice to see you use GPG and you posted your key. Here's mine. :^)

roberthazelett@gmail.com


-----BEGIN PGP PUBLIC KEY BLOCK-----

mQGiBD4/diwRBADr/Aj6KNKQVyJb25+lgx5FlQPAVoKiR7tX7jwckHxCUpXRqlN9
0Q+8poirh/zX7JWiBrHB8tBCAw+6Tuawomjgr6rSlXLEMLS0Uu9Blfcg7nUpgbiz
h8+BYRmY1hv3tVnX+V1QTfaS8RK7OPXdnvrMpQ5RTk1fAZYrpGqPKwxkZwCg/3D9
iBaJ4nnAz+llXKaA9TQKEgcD/jS6hZQweg6FlUT0Q7IQsF0Z7ZKQryM1evlg5bVt
hSzVVjYcMvya060jbHryHBEF2MJIp4f2W0wZN7s5yU4RjTEwoq8y+apoNLICJed2
9GboKM4sBR+WPyedhZUC+M4ldflUruNZ+ic9jEQXKffX6H+8GGBLqWZgK9klf6mS
CJ2eA/96y5/CoIJl7i4lvd9NGvhuxV7dRav1ao/dsWoRAB/Orgq1uYEPbyLhmAqB
JxSw6JW2MLuLB2U5IRIXSZT2iuix56TSkouw01iwi06Fl/ZLi3cAchGCtaDBqyml
B3be0ucXS61Py6w2slRKwo9vVbMlhKQiDzsYA1SM5FbtqxsEHbQUUm9iZXJ0IEVh
cmwgSGF6ZWxldHSJAFAEEBEDABAFAkJaMr4JCwkIBwIBBAoDAAoJEG0eiTJmp7Vj
zQIAn1gp+bAQj5bU9tlDBb5kO6pfcPlaAKDi0qde8vFkt3sGoPCjWlPeRIdvdbkE
DQQ+P3mPEBAA46JprVJtfoJuSJ1qqjdgzKHiKmB0pTYUlm0M1KOicp4NPzvr44/q
k2FpQACAr7CgcmyTEfKgUGEaD5JzRfUFYKmPAF40S5+HdSJbP1wnztYKtzGP8MYU
7/cyz8i0VJQccL5viXC3+Hqy/zwNF84SJ2RHTF7QcxfqMtjsYmGMD3agV/JqPuDK
2AqLApHo5W6p3g6rFRyj1aojl+h/z1LSGMin1qxVZw2vDlk4f2EjPcObTHUlp/S/
7hMTu9BvZU/3ukXLtP2dFxJHtiOiXMvnMPZxz9mSfgMgJA3hhXKZAAxXn39dTWEy
/sfjXr9kbcyzNaQOqN658Id/6hgMLEARpjxbpVNFtQXKhut26Roj/mWPWkIVgqHe
0qhBAj9UCUMcGA2ZBn0gbaPXOsNEvJ5ZbVVnvAbJGzm9MBg8P1adKVjJFFhSTQAW
ZSnZK6x2qV+vf2Ash+zJtInrpHQdNq+fhTFG24BlDofPVG1zmdfqcnA0XGh3YSUk
myYduID2mSCJcgzva7OOh5Q9uZtQW7vgCq7PJbI9msdPbI0sW55q2ZRvjLF3mHng
yUYmVP2TvvaD/UktHKhb/ngQDGNDGMTCEjJI0SRad31veyLmgsl5oGDETOHvZG2m
uutvXh9u/kx+qBBrKhLwugZlEaEFQQsccflTeIwulDiCC75sx14vg0sAAgIQAOOX
TNO47N230gdU0p2ILN6bsqvrFmQMQpSVtid2X3Z3C8T9xNQ85zaHdAZjcQKTRjOE
u5gMK38MyoTFSkQwmZCz1RcHag9k7TFeUU9HwNEArPVvUQc7TI+OQyyEJbBI3cHH
Ovl7HxtBd4c9qaF+JdwsxvnHcAzNQb4eCzIlnNJNOk4eCObowZ9UENLxSl6O0RPY
Xz6dbffOFEGWe9Vi9JeasyS+/sYZuq3f5p6zCOp8Zyy1a2ptmlnQzFgj7pC8BoTO
eI+2z+tYU5rFiz1Hq9k1bEtQtbPRSBscrhO7D0M5Zl0mps5syHVPTczeKuRfUmQJ
qy4gSj43kjg4naoKwhV4ok8tHyWqNwvcYgtLWaLIRC0BDYXFxf4BnAToGAApmSUC
7Z/7zOQYnx8q3ivosDLLucEsRcaZ08P2gafk+31FWxx9qq6OSRTFQ0XkmH4FSq4N
/eqc0qVxTY63XJHmgLxLqeFYVZjnS2BUrs9y488+ntC2a0UxM6CKgW8uTmjIfcP9
axdpNiosFgkdpqbr7ggqbjGUCro/CrNbo0f3UROykc9cbIpVZnEIPuHQki02Bipc
VpNJ3pz2+oWbrHVAVJ8mkw/im0cVoCPyHg4G4T7Ci1pstM1f8YhUi3eofPKFZJYV
CvaCF7XPO3dnr59+iQ6Xe8ZE/WKHiXCxTcQbdLE1iQBMBBgRAgAMBQI+P3mPBRsM
AAAAAAoJEG0eiTJmp7VjGdAAoPtK2hWatlI7eypsyX3nFOtw5uaFAJ0RwLxHOJjS
zuqTfmahz7gorlQQwA==
=+Vvb
-----END PGP PUBLIC KEY BLOCK-----

ROK
April 27, 2010 11:52 PM

i have been trying to understand the public key/private key thing for ever.
would it be an accurate simili to say
you give keys out 2 everyone but you pick who puts it in the lock?

Interociter Operator
August 27, 2010 5:13 PM

I would say it is more like the master password at a bank, where the president of the bank types in half the password, then he leaves the room and the vice president comes in and types the other half. You need both halves to get verified data.

Matriculated
January 30, 2011 3:12 PM

I think a good analogy to this would be:
Imagine the public key is a bunch of opened safes with a lock on it (partially disregarding the fact it could be physically tampered with). Then you send this open safe to someone and they place the item in it and shut the door. Now, even the person who placed the item in the safe can't even get back at what they just locked up (encrypted). The only key that can unlock it is your key for the safe (i.e. your "Private Key").

Though I stated to disregard the physical tampering as a possibility; if the algorithm was weak enough tampering may even be able to occur with the digital key pair, but this is highly improbable. Hope this helps.

Comments on this entry are closed.

If you have a question, start by using the search box up at the top of the page - there's a very good chance that your question has already been answered on Ask Leo!.

If you don't find your answer, head out to http://askleo.com/ask to ask your question.