DISCLAIMER: Author is not an expert in cryptography (he is not an expert in anything really). Use this stuff at your own risk. If you find bugs or inaccuracies, please create an issue or PR on the github repository.
The GNU Privacy Guard, also known as GnuPG or simply GPG, is a popular open source OpenPGP (RFC4880) implementation. The system is widely trusted for securing integrity and confidentiality of internet communications through various cryptographic methods. GPG is used in Debian and Redhat to verify downloads from package managers (apt, yum) and people like Edward Snowden and Glenn Greenwald use it to encrypt confidential emails.
Like most modern crypto systems, GPG makes use of public key methods. You can easily generate a personal keypair which consists of a private key and corresponding public key.
Your private key is to be kept secret and needed to sign or decrypt messages. The corresponding public key should be made available to anyone that needs to verify your signature, or encrypt messages which can only be decrypted by you.
Once we have someone’s public key, we can send them secure messages and verify their signatures. However how do we find and authenticate the public key of a person or server if we have not talked to them before?
The complexity in public key systems derives from authenticating public keys. If we can not trust our communication channel to be safe, we can only be sure that a public key belongs to given person if it has been signed by someone that we do trust.
The major difference between GPG and PKI systems (such as HTTPS) is how we authenticate public keys. HTTPS is based on a system with Certificate Authorities (CA). Anyone can create a keypair for any domain/personal name, however we only trust public keys which have been signed by an official CA. This CA is typically a commercial vendor which verifies your identity (e.g. via a copy of your passport) and then uses their own keypair to sign a certificate containing your public key and your personal name / email / domain.
GPG uses a different system which does not distinguish between peers and authorities. In GPG, anyone can sign another persons key. The GPG user determines which peers they choose to trust in their personal keyring. For new peers, the GPG software helps you figure out which of your current peers has verified the identity of the new peer, perhaps indirectly via a third or fourth peer, and so on: a “web of trust”.
The easiest way to exchange public keys and key signatures is via a keyserver. GPG is compatible with existing PGP key servers. These servers mirror each other so most keys are available on either one. This package automatically retrieves keys and signatures via the gpg_recv
function.
GPG keyservers do not need HTTPS. One should only trust GPG keys on basis of GPG signatures, regardless of how they were obtained. For this reason it is also valid to share GPG public keys via e.g. a website or email.
It is important to know which version of GPG you are running and where your home dir is. Your home directory contains your configuration and the keyrings. GPG defaults to your system keyring, which is the same as the gpg
command line utility and system package manager use.
List of 5
$ gpgconf: chr "/usr/local/bin/gpgconf"
$ gpg : chr "/usr/local/Cellar/gnupg/2.2.17/bin/gpg"
$ version:Class 'numeric_version' hidden list of 1
..$ : int [1:3] 2 2 17
$ home : chr "/Users/jeroen/.gnupg"
$ gpgme :Class 'numeric_version' hidden list of 1
..$ : int [1:3] 1 13 1
Use gpg_restart
to switch to another home directory, e.g. for a client which uses its own configuration and keyrings. For this example we store keys in a temporary directory.
gpg_restart(home = tempdir())
gpg (GnuPG) 2.2.17
libgcrypt 1.8.5
Copyright (C) 2019 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: /Users/jeroen/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
Use gpg_list_keys()
to see the current contents of your keyring. It is empty to start with:
[1] id name email
<0 rows> (or 0-length row.names)
Use gpg_keygen()
to generate a new public private keypair:
(mykey <- gpg_keygen(name = "Jerry", email = "[email protected]"))
[1] "70E09E1F3DA5A656"
id name email
1 70E09E1F3DA5A656 Jerry [email protected]
Use the gpg_recv
function to download a given key and all available signatures for this key from a keyserver. For example let’s import the public key from Michael Rutter which is used to sign the Ubuntu r-base packages from CRAN:
gpg_recv(id ="51716619E084DAB9")
Searching: https://keyserver.ubuntu.com
found imported secrets signatures revoked
1 1 0 0 0
(keyring <- gpg_list_keys())
id name email
1 70E09E1F3DA5A656 Jerry [email protected]
2 51716619E084DAB9 Michael Rutter [email protected]
Note that for imported keys, we do not have the private key:
(secring <- gpg_list_keys(secret = TRUE))
id name email
1 70E09E1F3DA5A656 Jerry [email protected]
The gpg_import
function reads an armored GPG key from a file or URL:
gpg_import("https://stallman.org/rms-pubkey.txt")
found imported secrets signatures revoked
1 1 0 0 0
However this file does not contain any signatures for this key. If we import it from a keyserver we also get the signatures:
(rms_id <- gpg_list_keys("rms")$id)
[1] "2C6464AF2A8E4C02"
gpg_recv(rms_id)
Searching: https://keyserver.ubuntu.com
found imported secrets signatures revoked
1 0 0 194 0
gpg_list_signatures(rms_id)
id timestamp name email success
1 2C6464AF2A8E4C02 2013-07-20 09:32:38 Richard Stallman [email protected] TRUE
2 624DC565135EA668 2013-07-20 09:37:45 FALSE
3 F05DDAE40371FCE5 2013-09-15 14:18:46 FALSE
4 231696C3EAE0078A 2013-09-24 14:15:58 FALSE
5 7B585B30807C2A87 2013-09-28 13:59:04 FALSE
6 7CEF29847562C516 2013-09-28 19:59:53 FALSE
7 520E0C8369B003EF 2013-08-20 03:31:55 FALSE
8 D56E1B4C135D47A1 2013-08-29 04:36:03 FALSE
9 31CC32CEF78F3EE4 2013-08-29 04:37:52 FALSE
10 9439E86389D0AF41 2013-08-29 04:55:01 FALSE
11 C5CFD08B22247CDF 2013-09-24 06:00:05 FALSE
12 20B7283AFE254C69 2013-09-28 13:44:02 FALSE
13 A866D7CCAE087291 2013-09-29 08:59:25 FALSE
14 6D33FBF5B5E4C71A 2013-09-30 06:52:36 FALSE
15 8916CADF8ACD372A 2013-10-02 04:17:17 FALSE
16 8E549D02234CC324 2013-10-03 00:36:24 FALSE
17 D605848ED7E69871 2013-10-04 02:03:23 FALSE
18 758EAEC123F62336 2013-10-12 15:53:08 FALSE
19 7B585B30807C2A87 2013-10-18 12:27:08 FALSE
20 E4A6D8A25310523C 2013-10-22 17:53:11 FALSE
[ reached 'max' / getOption("max.print") -- omitted 90 rows ]
The signature only contains the key ID of the signer. You would need to download the corresponding pubkeys to actually verify these signatures.
To export our newly created public key:
str <- gpg_export(id = mykey)
cat(str)
-----BEGIN PGP PUBLIC KEY BLOCK-----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=HRdZ
-----END PGP PUBLIC KEY BLOCK-----
If you also own the private key you can export this as well:
str <- gpg_export(id = mykey, secret = TRUE)
cat(str)
-----BEGIN PGP PRIVATE KEY BLOCK-----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=6Pug
-----END PGP PRIVATE KEY BLOCK-----
Delete a key from its ID or fingerprint. Let’s delete the RMS key:
gpg_delete('2C6464AF2A8E4C02')
[1] "2C6464AF2A8E4C02"
id name email
1 70E09E1F3DA5A656 Jerry [email protected]
2 51716619E084DAB9 Michael Rutter [email protected]
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. If you sign a file using your personal secret key, anyone can verify that this file has not been modified (i.e. the hash matches the one in your signature) via your public key.
GPG signatures are widely used by Linux package managers such as apt
to verify the integrity of downloaded files. Typically the public key is shipped with the OS, and the private key is owned by the repository maintainers. This way we can safely install software from any mirror or network.
Let’s use the private key we generated earlier to sign a file:
myfile <- tempfile()
writeLines("This is a signed message", con = myfile)
sig <- gpg_sign(myfile)
writeLines(sig, "sig.gpg")
cat(sig)
-----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEEeosEuHZ+Jnea2kuFcOCeHz2lplYFAl1+cIIACgkQcOCeHz2l
plbk+QgAsDMcKpYKGfsZf8dJU5wwUs8/D7xpoLIjoMo4rO4L7F5zu4V9Mi2JioI3
GlqPS3ZGLTVD0Oxdq+wjKhFOyMeBoJJ3ZNq6Uyh43nCqPxR5JNh3hIOgY14YZ23q
2OXdR8C8dtWlPjtoiTm0ySo16whJpnJcb36xulAf5D7J3OSXdLtwWmUzaFH6Kx0n
hY/fwpzLKbn4tGFhaZFg+XXHhd83aZGhUivKKIzBuVLT27QYws8z0Iiven23tHs7
qsKjxP9xZ1tDSGqXvoTRzPsfxGl3Bp+Cf1mHbniFWh4QaXhJ0OtB2TeLRtE98q8b
2hx+KMyO0ZlrvtPKcI4R+Mtp0NQN9Q==
=+kC+
-----END PGP SIGNATURE-----
You can also create a signed message which includes the data itself by setting mode
to normal
or clear
, which is useful for email:
clearsig <- gpg_sign(myfile, mode = "clear")
writeLines(clearsig, "clearsig.gpg")
cat(clearsig)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
This is a signed message
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEeosEuHZ+Jnea2kuFcOCeHz2lplYFAl1+cIIACgkQcOCeHz2l
plaMhAgAxDymC03UvL0rsHzbxg4M5EL+5NWz4FfrSRnSU9KIKU1ijVcd3Exe5OQG
Oor72EPW662QFRYfOgS5SFKsMK89qRsP8TLFJnmx3JoOgGOlIz6/ibaftVkoA7u5
D/PUDytTP6LyySxXUmAP9FIBb88Df2Ud/AZao3DGXseOLFzpmhd+yky1GfxbAHDw
ziOgssJm4me2uM3Qyc570MFgVB78PoK3GRlgj3QJ9ABn7WTN3chTlPXxJBNwRjQc
6Cr5gtipeAUWcd4+z8us0+aOtAZ3s6SQuHAluTmzpZYfgr4Bosh858Jh5nReGb14
oVslLMb6eZNDtmu/9ZBcBV7Bh7x7kA==
=ZMsI
-----END PGP SIGNATURE-----
The gpg_verify
function will see if a signature is valid for any of the keys in the keyring:
gpg_verify("sig.gpg", data = myfile)
fingerprint timestamp hash pubkey success
1 7A8B04B8767E26779ADA4B8570E09E1F3DA5A656 2019-09-15 10:10:26 SHA256 RSA TRUE
If the signature is in clear
or normal
mode, the signature file contains both the message and signature:
gpg_verify("clearsig.gpg")
fingerprint timestamp hash pubkey success
1 7A8B04B8767E26779ADA4B8570E09E1F3DA5A656 2019-09-15 10:10:26 SHA256 RSA TRUE
Let’s verify a Debian file. The Debian page on CRAN says the following:
The Debian backports archives on CRAN are signed with the key of Johannes Ranke (CRAN Debian archive) [email protected] with key fingerprint 6212 B7B7 931C 4BB1 6280 BA13 06F9 0DE5 381B A480
Let’s import his key so that we can verify the Release file, which contains checksums for all files in the repository:
# take out the spaces
johannes <- "E19F5F87128899B192B1A2C2AD5F960A256A04AF"
gpg_recv(johannes)
found imported secrets signatures revoked
1 1 0 0 0
If you don’t trust the CRAN homepage, you could check who has signed this key. You’d need to import the corresponding peer keys for more information.
gpg_list_signatures(johannes)
id timestamp name email success
1 AD5F960A256A04AF 2016-11-15 16:18:06 Johannes Ranke [email protected] TRUE
2 2F0F4E14F649AF90 2016-11-15 16:29:16 FALSE
3 06F90DE5381BA480 2016-11-15 16:35:39 FALSE
Now lets verify the release files:
# Verify the file
library(curl)
curl_download('https://cran.r-project.org/bin/linux/debian/buster-cran35/Release', 'Release')
curl_download('https://cran.r-project.org/bin/linux/debian/buster-cran35/Release.gpg','Release.gpg')
gpg_verify('Release.gpg', 'Release')
fingerprint timestamp hash pubkey success
1 AD7B5162BA456BE3526F8D92FCAE2A0E115C3D8A 2019-07-09 00:20:34 SHA512 RSA TRUE
Looking good! We can trust the checksums in the Release
file to be legitimate.
GPG uses public key encryption. You can use someone’s public key to encrypt a message or document, in a way that only the owner of the corresponding private key will be able to decrypt. This is a great way to send somebody highly confidential data.
For example we want to send an email Jeroen containing top secret information that may not be snooped by our ISP or email provider. First we import Jeroen’s public key using the ID as listed e.g. here:
jeroen <- '16C019F96112961CEB4F38B76094FC5BDA955A42'
gpg_recv(jeroen)
found imported secrets signatures revoked
1 1 0 0 0
writeLines("Pizza delivery is on it's way!", "secret.txt")
msg <- gpg_encrypt("secret.txt", receiver = jeroen)
writeLines(msg, "msg.gpg")
unlink("secret.txt")
cat(msg)
-----BEGIN PGP MESSAGE-----
hQEMA4BQ/mdnc2saAQgAgPrJgWhC4BntEeEQFP8Yjg4bbM76gFHwLUAbbcA45Awi
Xr9qZdmA5kmEk3tygrAAWhK2h9IILgG/SS2naMqcPlW9lQhuVh4uSH51c1Mhqwso
gZQ3QVtPWEYBTA0wBQh7TrVkfY+uY5YtV89g+MkxwbJdArmopnIpv5DhpUGGupZQ
USkxAs6OAWfhkrfHo5++cSssRn40HcHY+ylLP7opYgGhZHFwKa75+K7x2WWjoTjT
hFOe8SwuQUOVSx8OTnsYLLWFUM95kBc9r19Sd1HSLEben5jh19fnqyIkM7uGLFoj
xWqxCIQQNNZPlhjF0Wnp7jkH3eSs5G3gwbaCaJ8FW9JaAbN4+340qMdgOplLAqgs
/qwC2m2hbk+Lj1bAloSdNM5M+J9xeNABSmL75z94/G4rBkpTJUOgG2mXC95I0qDQ
WYC7i5BxV6FKlC4SRADiYnDK9mApI98KNIE8
=/Vxc
-----END PGP MESSAGE-----
Now you can safely send this message over any channel (email, twitter, etc). Nobody in the world besides Jeroen will be able to decipher this message (not even you).
Decrypting a message is just as easy. GPG will automatically find the correct private key from your keyring, or raise an error if you don’t have it. For example we will not be able to decrypt the message we created above for Jeroen
# This will error, we do not have this private key
gpg_decrypt("msg.gpg")
Error: GPGME verify signatures and decrypt message error: No secret key
To demonstrate decryption, we encrypt a message using our own keypair (for which we own the private key).
writeLines("This is a test!", "secret.txt")
msg <- gpg_encrypt("secret.txt", receiver = mykey)
writeLines(msg, "msg.gpg")
cat(msg)
-----BEGIN PGP MESSAGE-----
hQEMA3Dgnh89paZWAQgAnkghwsrwj3jrdDq/pns2tiKoEjW8pFYHHbHwZb54StF6
D2AtdiGbFgH+Bueh6HUAL8xAuCrZWyBtzff6aGTpksRNylPfZmss8VvoDwppFfNd
P7TVAiXzYxXzVECafa5sTeAKI5EnXBqTjhRF8tBFC266T4VXrDaFOT2ZqWHjw0hy
LnJN370ohXmjIzItoc2wN4Q6Alpz3yFv8SjVqQ15rdKthY0NyVYZZ1juVNlQMhjf
AaVetnKEGVxXfAKKJ4A3Hqf8Ey56xiLLwcn0/9VXzIIw6atrlPNYcrNBpkz9cjLW
xHufcgXk7qyF7xUOvfLWxDuO1svtWtnaJifwpRKP/9JJAZFxrLwKnIiLCMokMlRu
GAWigzoppUbB55JMI6yeX8FBCwUMwStYb0L/AHCTO41mNVrcIG3/mAH5bqjGIBSS
ga+PytLo0hxbdg==
=Rijh
-----END PGP MESSAGE-----
Decryption is simple, given that we own the secret key for the message:
gpg_decrypt("msg.gpg")
[1] "This is a test!\n"
So we showed how to encrypt a message so that it can only be read by the receiver. But how does Jeroen verify the sender identity?
In signed encryption, also known as authenticated encryption, uses combined encryption and signing. The public key of the receiver is used to encrypt the message, and the private key of the sender to sign the message. This way the message is both confidential and the integrity of the sender can be checked and verified, only by the receiver.
msg <- gpg_encrypt("secret.txt", receiver = jeroen, signer = mykey)
writeLines(msg, "msg.gpg")
cat(msg)
-----BEGIN PGP MESSAGE-----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=Ycbw
-----END PGP MESSAGE-----
If the encrypted message contains a signature, it will automatically be verified when the message is decrypted. The function raises an error otherwise.
For purpose of illustrating authenticated decryption, we encrypt and sign using our own key (which usually does not make sense):
msg <- gpg_encrypt("secret.txt", receiver = mykey, signer = mykey)
writeLines(msg, "msg.gpg")
gpg_decrypt("msg.gpg")
[1] "This is a test!\n"
attr(,"signer")
[1] "7A8B04B8767E26779ADA4B8570E09E1F3DA5A656"
The signer fingerprint (if any) will be added as an attribute to the decrypted message.