Pete Stephenson's Public Keys

Pete Stephenson's Public Keys

This page contains details of my commonly used PGP keys. You can use these keys to verify digital signatures in messages I've sent or to send me encrypted messages.

Please verify the identifying characteristics (key ID and fingerprints) of my keys with the information below before sending me signed or encrypted mail.

I encourage you to send me PGP signed/encrypted mail when you contact me.

Note: As of 2011-11-27, I've moved one primary key (0xDA122186 and its encryption subkey 0x19DF6C14) to secure offline storage. I have published new subkeys for both signing and encryption, and they are available here and on public keyservers. If you have an older copy of this public key, please update to the latest version. In general, it's a good idea to update your public keyring on a regular basis.

See here and here for more information about subkeys and why they're a good idea.

For those who are interested, my active RSA subkeys for key 0xDA122186 are stored on a OpenPGP smartcard, while the primary key is kept offline on a secure system. Why not keep the primary key on the smartcard? For whatever reason, DSA keys are not supported by the smartcard, but RSA subkeys of DSA keys are. The primary and subkeys for 0x85EB9F44 are stored on separate OpenPGP smartcards, with a backup maintained offline on a secure system. I am also evaluating YubiKey 5 NFC cards as a more convenient, portable, and modern means of using those keys.


PGP Keys and Fingerprints

Active Keys:
Key #1: (Preferred Key)
UID: Pete Stephenson <pete@heypete.com>
Key ID: 0x85EB9F44 (click to download)
Key Length and Type: 4096 RSA
Created: 2013-04-19 (YYYY-MM-DD)
Expires: Never
Fingerprint: 1C60 0C6C CEA4 4628 D243 9A13 9A5C C3A4 85EB 9F44
Subkeys:

Signing: 0xF993F940 - RSA 2048, created: 2013-04-20, expires: 2021-05-14 (OpenPGP Smartcard)
Signing: 0x952887DE - RSA 2048, created: 2020-08-13, expires: 2025-08-12 (YubiKey 5)
Encryption: 0x034D2B98- RSA 2048, created 2013-04-20, expires 2025-08-11 (OpenPGP Smartcard & YubiKey 5)

Key #2:
UID: Pete Stephenson <pete@heypete.com>
Key ID: 0xDA122186 (click to download)
Key Length and Type: 3072 DSA
Created: 2010-06-05 (YYYY-MM-DD)
Expires: Never
Fingerprint: 05DA 555F 35DC 901F 2697 5F8D 9AB7 E89F DA12 2186
Subkeys:

Active:
Signing: 0x6E0CAE95 - RSA 2048, created: 2011-11-27, expires: 2021-05-14 (OpenPGP Smartcard)
Signing: 0x54955C7A - RSA 2048, created: 2020-08-13, expires: 2025-08-12 (YubiKey 5)
Encryption: 0x827F263C - RSA 2048, created 2011-11-27, expires 2025-08-11 (OpenPGP Smartcard & YubiKey 5)

Inactive: (while still valid, please do not use)
Encryption: 0x19DF6C14 - ElGamal 4096, created: 2010-06-05, expires: never

Older, revoked key:
UID: Pete Stephenson <pete@heypete.com>
Key ID: 0x8A794603
Key Length and Type: 1024 DSA
Created: 2007-09-24 (YYYY-MM-DD)
Expires: 2013-01-01 (YYYY-MM-DD)
Revoked: 2013-09-07 (YYYY-MM-DD) - Reason: key expired, revoking to ensure it's no longer used.
Fingerprint: 476F 3423 A970 C51B D5F6 FF06 8FFB F833 8A79 4603

How can I download your public key?

My PGP keys are available above, as well as on common keyservers, keys.openpgp.org, and key #1 is available on the PGP Keyserver.

Again, please verify that the fingerprints match the ones published above before using them. Several years ago researchers generated collisions in the short, 32-bit key ID (e.g. 0x85EB9F44) for keys in the strong set, including my own. They later revoked all of the colliding imposter keys once they were inadvertently uploaded to the keyservers. To avoid any confusion, please verify the keys' full fingerprint.

© Pete Stephenson, HeyPete.com