Damien Goutte-Gattat via Gnupg-users wrote:
On Fri, Oct 29, 2021 at 04:04:11PM +0200, Romain LT via Gnupg-users
wrote:
[...]
private-keys-v1.d/
folder with private keys files, named afte key or subkey keygrip
Is there only the private key part of my own keys in this ? or
is there a way to obtain public+private key from one of those
files ?
Private key only. I believe the purely “mathematical” components of
the public key can be derived from it (though I may be wrong here),
but that does not include the User IDs and associated signatures, that
are necessary to make a ”full” public key – those components are in
pubring.kbx.
You are correct: key generation for asymmetric systems involves randomly
choosing a private key and calculating the corresponding public key. The
mathematics are such that this is easy but the reverse is believed to be
computationally infeasible. There are a variety of "neat math tricks" to
make the system more efficient under various conditions, but ultimately
public keys are derived from private keys and this determines which key
is which.
For example, RSA relies on the ease of calculating a product versus the
presumed difficulty of factoring composites of two approximately
similar-magnitude primes. Either key can decrypt a message encrypted by
the other; smoothing over some mathematical and cryptographic details,
this is used for signatures by encrypting the signature with the private
key which allows the public key to decrypt (verify) it.
Again, the difference between the public and private keys is that, given
the private key the public key can be calculated, while the private key
cannot be (feasibly) calculated given the public key.
You may note that I have been very light on details; this is
intentional. If you are unclear about a basic detail like this, you will
almost certainly fall into one of numerous pitfalls that make asymmetric
systems easily breakable. Do not roll your own; use an existing
well-vetted Free program (like GPG!) instead. ***NEVER*** trust nonfree
cryptographic software: you have no way to even begin to effectively
audit such a "black box" for backdoors and the history of proprietary
encryption is exceptionally bad, ranging from simple incompetence
(proprietary algorithms tend to fall to cryptanalysis quite quickly once
they are examined) to deliberate backdoors.
-- Jacob
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users