How to migrate my old PGP key to a more secure algorithm?












13















I have an old PGP using old GnuPG algorithm defaults. According to Best encryption and signing algorithm for GnuPG: RSA/RSA or DSA/Elgamal?, those algorithm settings are no longer sufficient, so I want to move my PGP key to more secure algorithm settings. What is the best way to do that? Do I have to revoke my key and create an entirely new key?










share|improve this question

























  • You may also be interested in the work of Asheesh Laroia who replaced his 1024-bit DSA key with a 4096-bit RSA key, but kept the same short key ID: asheesh.org/note/debian/short-key-ids-are-bad-news.html

    – IQAndreas
    Oct 16 '15 at 20:11
















13















I have an old PGP using old GnuPG algorithm defaults. According to Best encryption and signing algorithm for GnuPG: RSA/RSA or DSA/Elgamal?, those algorithm settings are no longer sufficient, so I want to move my PGP key to more secure algorithm settings. What is the best way to do that? Do I have to revoke my key and create an entirely new key?










share|improve this question

























  • You may also be interested in the work of Asheesh Laroia who replaced his 1024-bit DSA key with a 4096-bit RSA key, but kept the same short key ID: asheesh.org/note/debian/short-key-ids-are-bad-news.html

    – IQAndreas
    Oct 16 '15 at 20:11














13












13








13


2






I have an old PGP using old GnuPG algorithm defaults. According to Best encryption and signing algorithm for GnuPG: RSA/RSA or DSA/Elgamal?, those algorithm settings are no longer sufficient, so I want to move my PGP key to more secure algorithm settings. What is the best way to do that? Do I have to revoke my key and create an entirely new key?










share|improve this question
















I have an old PGP using old GnuPG algorithm defaults. According to Best encryption and signing algorithm for GnuPG: RSA/RSA or DSA/Elgamal?, those algorithm settings are no longer sufficient, so I want to move my PGP key to more secure algorithm settings. What is the best way to do that? Do I have to revoke my key and create an entirely new key?







security pgp






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Mar 20 '17 at 10:17









Community

1




1










asked Jun 30 '13 at 16:10









HongliHongli

1685




1685













  • You may also be interested in the work of Asheesh Laroia who replaced his 1024-bit DSA key with a 4096-bit RSA key, but kept the same short key ID: asheesh.org/note/debian/short-key-ids-are-bad-news.html

    – IQAndreas
    Oct 16 '15 at 20:11



















  • You may also be interested in the work of Asheesh Laroia who replaced his 1024-bit DSA key with a 4096-bit RSA key, but kept the same short key ID: asheesh.org/note/debian/short-key-ids-are-bad-news.html

    – IQAndreas
    Oct 16 '15 at 20:11

















You may also be interested in the work of Asheesh Laroia who replaced his 1024-bit DSA key with a 4096-bit RSA key, but kept the same short key ID: asheesh.org/note/debian/short-key-ids-are-bad-news.html

– IQAndreas
Oct 16 '15 at 20:11





You may also be interested in the work of Asheesh Laroia who replaced his 1024-bit DSA key with a 4096-bit RSA key, but kept the same short key ID: asheesh.org/note/debian/short-key-ids-are-bad-news.html

– IQAndreas
Oct 16 '15 at 20:11










1 Answer
1






active

oldest

votes


















8














There is no way to "upgrade" an OpenPGP key. You will have to create a new one, and you will lose your reputation in the web of trust.



Some people I met decided to stick with a RSA 1024 primary key, but use stronger subkeys instead (which is easily possible without losing your reputation in the web of trust), which comes with secure day-to-day use (for encryption/signing documents with your subkeys), but might enable attackers to add and revoke certifications, subkeys and UIDs.



Think about:





  • Signing your new key with the old one, so others could follow the signatures

  • Sending a key transition statement (seems down, alternative link on archive.org) to those that signed your old key; some of them might also sign your new one

  • Getting your new key signed, i.e. go to key signing parties

  • Revoking the old one after some time

  • Using a seemingly unnecessary large key as primary key and smaller subkeys for day-to-day usage. You will never need the primary key for anything but signing other keys (which is rare) and others verifying your signatures (which is cheap anyway).






share|improve this answer


























  • How does using subkeys increase security? All the keys are on my laptop anyway, so if anybody manages to compromise my laptop all my keys are compromised. Is it to protect against theoretical attacks in which an attacker can somehow derive the private key from a signed/encrypted message?

    – Hongli
    Jul 1 '13 at 15:36











  • Read this answer on security.SE which shows up some advantages. It does not protect from such attacks, it's more a matter of keeping your web of trust when you need to revoke the key you're using.

    – Jens Erat
    Jul 2 '13 at 8:44











  • I get a 'Permission denied' error when I click on the 'key transition statement' link.

    – sebastian
    Oct 12 '16 at 14:46











  • That site seems down. Luckily, the document is archived on archive.org, I added a deeplink.

    – Jens Erat
    Oct 12 '16 at 16:33











Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f613859%2fhow-to-migrate-my-old-pgp-key-to-a-more-secure-algorithm%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









8














There is no way to "upgrade" an OpenPGP key. You will have to create a new one, and you will lose your reputation in the web of trust.



Some people I met decided to stick with a RSA 1024 primary key, but use stronger subkeys instead (which is easily possible without losing your reputation in the web of trust), which comes with secure day-to-day use (for encryption/signing documents with your subkeys), but might enable attackers to add and revoke certifications, subkeys and UIDs.



Think about:





  • Signing your new key with the old one, so others could follow the signatures

  • Sending a key transition statement (seems down, alternative link on archive.org) to those that signed your old key; some of them might also sign your new one

  • Getting your new key signed, i.e. go to key signing parties

  • Revoking the old one after some time

  • Using a seemingly unnecessary large key as primary key and smaller subkeys for day-to-day usage. You will never need the primary key for anything but signing other keys (which is rare) and others verifying your signatures (which is cheap anyway).






share|improve this answer


























  • How does using subkeys increase security? All the keys are on my laptop anyway, so if anybody manages to compromise my laptop all my keys are compromised. Is it to protect against theoretical attacks in which an attacker can somehow derive the private key from a signed/encrypted message?

    – Hongli
    Jul 1 '13 at 15:36











  • Read this answer on security.SE which shows up some advantages. It does not protect from such attacks, it's more a matter of keeping your web of trust when you need to revoke the key you're using.

    – Jens Erat
    Jul 2 '13 at 8:44











  • I get a 'Permission denied' error when I click on the 'key transition statement' link.

    – sebastian
    Oct 12 '16 at 14:46











  • That site seems down. Luckily, the document is archived on archive.org, I added a deeplink.

    – Jens Erat
    Oct 12 '16 at 16:33
















8














There is no way to "upgrade" an OpenPGP key. You will have to create a new one, and you will lose your reputation in the web of trust.



Some people I met decided to stick with a RSA 1024 primary key, but use stronger subkeys instead (which is easily possible without losing your reputation in the web of trust), which comes with secure day-to-day use (for encryption/signing documents with your subkeys), but might enable attackers to add and revoke certifications, subkeys and UIDs.



Think about:





  • Signing your new key with the old one, so others could follow the signatures

  • Sending a key transition statement (seems down, alternative link on archive.org) to those that signed your old key; some of them might also sign your new one

  • Getting your new key signed, i.e. go to key signing parties

  • Revoking the old one after some time

  • Using a seemingly unnecessary large key as primary key and smaller subkeys for day-to-day usage. You will never need the primary key for anything but signing other keys (which is rare) and others verifying your signatures (which is cheap anyway).






share|improve this answer


























  • How does using subkeys increase security? All the keys are on my laptop anyway, so if anybody manages to compromise my laptop all my keys are compromised. Is it to protect against theoretical attacks in which an attacker can somehow derive the private key from a signed/encrypted message?

    – Hongli
    Jul 1 '13 at 15:36











  • Read this answer on security.SE which shows up some advantages. It does not protect from such attacks, it's more a matter of keeping your web of trust when you need to revoke the key you're using.

    – Jens Erat
    Jul 2 '13 at 8:44











  • I get a 'Permission denied' error when I click on the 'key transition statement' link.

    – sebastian
    Oct 12 '16 at 14:46











  • That site seems down. Luckily, the document is archived on archive.org, I added a deeplink.

    – Jens Erat
    Oct 12 '16 at 16:33














8












8








8







There is no way to "upgrade" an OpenPGP key. You will have to create a new one, and you will lose your reputation in the web of trust.



Some people I met decided to stick with a RSA 1024 primary key, but use stronger subkeys instead (which is easily possible without losing your reputation in the web of trust), which comes with secure day-to-day use (for encryption/signing documents with your subkeys), but might enable attackers to add and revoke certifications, subkeys and UIDs.



Think about:





  • Signing your new key with the old one, so others could follow the signatures

  • Sending a key transition statement (seems down, alternative link on archive.org) to those that signed your old key; some of them might also sign your new one

  • Getting your new key signed, i.e. go to key signing parties

  • Revoking the old one after some time

  • Using a seemingly unnecessary large key as primary key and smaller subkeys for day-to-day usage. You will never need the primary key for anything but signing other keys (which is rare) and others verifying your signatures (which is cheap anyway).






share|improve this answer















There is no way to "upgrade" an OpenPGP key. You will have to create a new one, and you will lose your reputation in the web of trust.



Some people I met decided to stick with a RSA 1024 primary key, but use stronger subkeys instead (which is easily possible without losing your reputation in the web of trust), which comes with secure day-to-day use (for encryption/signing documents with your subkeys), but might enable attackers to add and revoke certifications, subkeys and UIDs.



Think about:





  • Signing your new key with the old one, so others could follow the signatures

  • Sending a key transition statement (seems down, alternative link on archive.org) to those that signed your old key; some of them might also sign your new one

  • Getting your new key signed, i.e. go to key signing parties

  • Revoking the old one after some time

  • Using a seemingly unnecessary large key as primary key and smaller subkeys for day-to-day usage. You will never need the primary key for anything but signing other keys (which is rare) and others verifying your signatures (which is cheap anyway).







share|improve this answer














share|improve this answer



share|improve this answer








edited Jan 5 at 19:27









Community

1




1










answered Jun 30 '13 at 21:30









Jens EratJens Erat

12.6k114459




12.6k114459













  • How does using subkeys increase security? All the keys are on my laptop anyway, so if anybody manages to compromise my laptop all my keys are compromised. Is it to protect against theoretical attacks in which an attacker can somehow derive the private key from a signed/encrypted message?

    – Hongli
    Jul 1 '13 at 15:36











  • Read this answer on security.SE which shows up some advantages. It does not protect from such attacks, it's more a matter of keeping your web of trust when you need to revoke the key you're using.

    – Jens Erat
    Jul 2 '13 at 8:44











  • I get a 'Permission denied' error when I click on the 'key transition statement' link.

    – sebastian
    Oct 12 '16 at 14:46











  • That site seems down. Luckily, the document is archived on archive.org, I added a deeplink.

    – Jens Erat
    Oct 12 '16 at 16:33



















  • How does using subkeys increase security? All the keys are on my laptop anyway, so if anybody manages to compromise my laptop all my keys are compromised. Is it to protect against theoretical attacks in which an attacker can somehow derive the private key from a signed/encrypted message?

    – Hongli
    Jul 1 '13 at 15:36











  • Read this answer on security.SE which shows up some advantages. It does not protect from such attacks, it's more a matter of keeping your web of trust when you need to revoke the key you're using.

    – Jens Erat
    Jul 2 '13 at 8:44











  • I get a 'Permission denied' error when I click on the 'key transition statement' link.

    – sebastian
    Oct 12 '16 at 14:46











  • That site seems down. Luckily, the document is archived on archive.org, I added a deeplink.

    – Jens Erat
    Oct 12 '16 at 16:33

















How does using subkeys increase security? All the keys are on my laptop anyway, so if anybody manages to compromise my laptop all my keys are compromised. Is it to protect against theoretical attacks in which an attacker can somehow derive the private key from a signed/encrypted message?

– Hongli
Jul 1 '13 at 15:36





How does using subkeys increase security? All the keys are on my laptop anyway, so if anybody manages to compromise my laptop all my keys are compromised. Is it to protect against theoretical attacks in which an attacker can somehow derive the private key from a signed/encrypted message?

– Hongli
Jul 1 '13 at 15:36













Read this answer on security.SE which shows up some advantages. It does not protect from such attacks, it's more a matter of keeping your web of trust when you need to revoke the key you're using.

– Jens Erat
Jul 2 '13 at 8:44





Read this answer on security.SE which shows up some advantages. It does not protect from such attacks, it's more a matter of keeping your web of trust when you need to revoke the key you're using.

– Jens Erat
Jul 2 '13 at 8:44













I get a 'Permission denied' error when I click on the 'key transition statement' link.

– sebastian
Oct 12 '16 at 14:46





I get a 'Permission denied' error when I click on the 'key transition statement' link.

– sebastian
Oct 12 '16 at 14:46













That site seems down. Luckily, the document is archived on archive.org, I added a deeplink.

– Jens Erat
Oct 12 '16 at 16:33





That site seems down. Luckily, the document is archived on archive.org, I added a deeplink.

– Jens Erat
Oct 12 '16 at 16:33


















draft saved

draft discarded




















































Thanks for contributing an answer to Super User!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f613859%2fhow-to-migrate-my-old-pgp-key-to-a-more-secure-algorithm%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Probability when a professor distributes a quiz and homework assignment to a class of n students.

Aardman Animations

Are they similar matrix