OpenPGP for application developers¶
2024-05-06
- 1. Introducing OpenPGP
- 2. A high-level view
- 3. Cryptographic concepts and terms
- 4. Certificates
- 5. Managing private key material in OpenPGP
- 6. OpenPGP Signatures
- 7. Signatures over data
- 8. Signatures on components
- 9. Signature verification
- 10. Encryption
- 11. Decryption
- 12. Compression
- 13. ASCII armor
- 14. Pitfalls / Things to keep in mind
- 15. Algorithms and Policy
- 16. OpenPGP versions
- 17. Migration from OpenPGP v4 to v6
- 18. Advanced material: Certificates
- 18.1. When are certificates valid?
- 18.2. Certificates are effectively append-only data structures
- 18.3. Merging
- 18.4. Certificate minimization
- 18.5. Fingerprints and beyond: “Naming” certificates in user-facing contexts
- 18.6. Certificate freshness: Triggering updates with an expiration time
- 18.7. Metadata leak of Social Graph
- 18.8. Adding unbound, local User IDs to a certificate
- 18.9. Certificate distribution mechanisms
- 18.10. Third-party certification flooding
- 18.11. First-Party attested third-party certifications in OpenPGP (1pa3pc)
- 19. Advanced material: Private keys
- 20. Advanced material: Signatures
- 21. Advanced material: Signatures over data
- 22. Advanced material: Signatures on components
- 23. Advanced material: Signature verification
- 24. Advanced material: Encryption
- 25. Advanced material: Decryption
- 26. Zooming in: Packet structure of certificates
- 27. Zooming in: Packet structure of private key material
- 28. Zooming in: Packet structure of data signatures
- 29. Zooming in: Packet structure of encrypted data
- 30. Glossary
- 31. Acknowledgements
- 32. Appendix A: OpenPGP artifacts