Skip navigation.
Home
Freedom is contagious.

GPG Keysigning

If you want to participate in the party you have to do some homework first! Without further ado, and with thanks to V. Alex Brennen:

**What's a key-signing party?**

A key-signing party is a get-together with GPG users for the purpose of meeting other GPG users and signing each other's keys. This helps to extend the "web of trust" to a great degree. Also, it sometimes serves as a forum to discuss strong cryptography and related issues.

**Required Items?**

1. Physical attendance
2. Positive picture ID
3. Your key ID, key type, HEX fingerprint, and key size
4. A pen/pencil or whatever you'd like to write with....

Computers are *not* required!

**Why should I use GPG?**

You should use GPG, if you need (or want) to protect your personal emails from being read by individuals or entities other than your intended recipient(s). GPG, when used correctly, can provide message privacy, message integrity, message authentication, and to some degree non-repudiation.

**How do I participate?**

You have to perform 4 steps to participate in the party:

1. Generate a GPG key-pair if you do not already have one. Read this page for instructions on how to do this:
http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html#keypair_generation

2. Send your GPG public key to the key server at pgp.mit.edu. This is to facilitate everyone signing the key at the conclusion of the party.
For information on how to do this, look at this section of the former
page: http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html#keyserver

3. Email your key ID, key type, HEX fingerprint, and key size to clinton ~at~ collins-family ~dot~ org with the subject line of "GPG". This information is available via the "gpg --fingerprint " command.

4. Attend the GatorLUG meeting and bring the Required things listed above -- especially your key information and your ID.

**What happens at the meeting?**

Because I know this method works, we are going to have what V. Alex Brennen calls a "centralized party." As you come in everyone will pick up a printout containing the key information you sent to me. At the end of the general meeting everyone will verify that their key information on the printout matches the key information they sent. This is done verbally so that everyone can check off each key list entry as it's verified. After all of the keys have been verified, the participants and coordinator form a long single file line while holding their IDs in front of them. The person at the head of the line walks down the line and checks each person's ID. If their ID is correct and the person walking down the line has a check next to the individual in the line's key verifying that they had said it was their key at the beginning of the party, he places a second check mark on his list. Once a key has two check marks it can be signed.

**And then what happens afterward?**

You (eventually) go home and sign all the keys which have two check marks on your sheet. Signing the keys is described here:
http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html#id2557964

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

It should be noted that the

It should be noted that the links for the keysigning party has changed:

http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.