In today’s blog post we will show you how to import public keys to your library, how and why to sing them, how to export your own public key and how to display details about the keys. As usual, this is accompanied by instructional video showing you all the process.
You’ve already personalized your Cryptoucan™ and got your own set of keys and PIN codes. Now it’s time to finally show you what to do before you’ll be able to send your first encrypted email and how to get your public key ready for others to use.
If you came just to see the instructional video, click here!
You will most probably be exporting keys when you want to share your public keys with others so they can send you encrypted emails. This will export your public key, which you can then put to your personal webpage, upload to a key server, or just send to people. This is how you do it:
New window will open. Here you can:
You may also notice the option “Include secret key in exported file”, this option won’t work though as you cannot export your secret key as a security feature of Cryptoucan™.
And that’s it! Your public key is now ready to use
Picture 1: Exporting a key
You’re going to need to import public keys of others to be able to send encrypted emails to them. Key manager is basically a library that stores all the keys you need.
You’ll get the public key file from the person himself/herself, from key server or from trusted key server. This is how you import keys into it:
Dialog window saying “Import successful” will appear when the process is done.
Picture 2: Importing a key
By certifying the keys you’ve imported, you’re making sure the key really belongs to the person it’s supposed to. This is done by comparing fingerprints. Fingerprint is a kind of checksum which is statistically unique to each key.
To check the fingerprint of the key you’ve imported, you’ll have to retrieve the key fingerprint from the key owner via a trusted channel. Some examples are:
When you get the fingerprint from your trusted source, this is what to do next:
You will see this key’s fingerprint in the text at the top of the window
GPGTools will ask you to enter user PIN1 on your Cryptoucan™ to sign the key with your identity.
And that’s it, the key is now signed and its trust level is now higher.
Picture 3: Fingerprint check
The last thing you need to know for basic operations in the key manager is displaying details about the key identity of keys in your library. Here is how you can display them:
And that’s it!
Picture 4: Window with details about the identity
Video 1: Cryptoucan™ usage: Key management on macOS
And that’s all for today’s post. We will see you next week! Thank you for reading.