{ PGP Key Info Parser }

// extract fingerprint, algorithm, and uid from pgp keys

Parse armored PGP public keys to extract fingerprint, key ID, algorithm, bit length, creation date, expiry, and User IDs. Free browser-based tool.

Paste a block starting with -----BEGIN PGP PUBLIC KEY BLOCK-----
🔑

Ready to parse

Paste a PGP key block and click Parse Key

HOW TO USE

  1. 01
    Get a PGP key

    Export or copy an armored PGP public key block from your keyring, GPG, or any keyserver.

  2. 02
    Paste and parse

    Paste the full armored block including the BEGIN / END headers into the input field.

  3. 03
    Read the details

    Copy fingerprint, check algorithm, review UIDs and subkeys — all extracted instantly in your browser.

FEATURES

Fingerprint Algorithm UIDs Subkeys Expiry Date Key ID Bit Length Browser-only

USE CASES

  • 🔑 Verify a PGP key before trusting it
  • 🔍 Extract fingerprint for keyserver lookups
  • 🛡️ Audit algorithm strength (RSA vs Ed25519)
  • 📋 Check UID and expiry before encrypting
  • 🔧 Debug GPG / OpenPGP key issues

WHAT IS THIS?

The PGP Key Info Parser decodes armored OpenPGP public key blocks entirely in your browser. It extracts the fingerprint, key algorithm, bit length, User IDs, creation date, expiry, and any subkeys — with zero server upload.

RELATED TOOLS

FREQUENTLY ASKED QUESTIONS

Is my PGP key sent to your server?

No. All parsing happens entirely in your browser using JavaScript. Your key data never leaves your device. This tool is 100% client-side.

What is a PGP fingerprint?

A fingerprint is a unique hash (typically SHA-1 for older keys or SHA-256 for newer) of the public key. It's used to verify key identity and prevent impersonation attacks. Always compare fingerprints out-of-band before trusting a key.

What algorithms does PGP support?

OpenPGP supports RSA (1024–4096 bit), DSA, ElGamal, and modern elliptic curve algorithms like Ed25519, Curve25519 (X25519), and ECDSA/ECDH on NIST curves. Ed25519 and Curve25519 are recommended for new keys.

What is a UID in a PGP key?

A User ID (UID) contains identity information like name and email address, formatted as Name <email@example.com>. A key can have multiple UIDs. Each UID can be independently signed and certified by others.

What are PGP subkeys?

Subkeys are secondary keys tied to a primary master key. They are commonly used to separate signing and encryption duties, so the master key can be kept offline while subkeys handle day-to-day operations.

Can I parse a secret/private PGP key?

This tool is designed for public key blocks (BEGIN PGP PUBLIC KEY BLOCK). You should never paste private keys into any web tool. Private key data should remain strictly offline and protected.

What is a PGP Key Info Parser?

A PGP Key Info Parser is a tool that reads an armored OpenPGP public key block and extracts the metadata embedded within it — including the key fingerprint, algorithm, bit length, creation date, expiry date, User IDs (UIDs), and any subkeys. Instead of using the GPG command line or specialized desktop software, you can paste any armored key and get a structured summary instantly.

💡 Looking for premium web development assets? MonsterONE offers unlimited downloads of templates, UI kits, and developer assets — worth checking out.

Understanding the PGP Armored Format

PGP keys are binary data encoded in Base64 and wrapped in ASCII "armor" headers. An armored public key block begins with -----BEGIN PGP PUBLIC KEY BLOCK----- and ends with -----END PGP PUBLIC KEY BLOCK-----. Inside, the key material follows the OpenPGP packet structure defined in RFC 4880 and its successor RFC 9580.

The binary packets inside encode multiple pieces of information: the primary key type, creation time, public key algorithm parameters, and then a sequence of User ID packets and signature packets. This parser decodes those packets to present readable information without requiring GPG or any command-line tools.

How to Read a PGP Fingerprint

The fingerprint is a cryptographic hash of the public key material. For version 4 keys (the most common), it is a 160-bit (40 hex character) SHA-1 hash. For version 6 keys (the newer RFC 9580 format), it is a 256-bit SHA-256 hash. The fingerprint is the canonical way to identify a key — two different keys cannot share the same fingerprint.

When sharing your key, it is good practice to share the full fingerprint alongside the key or key ID so that recipients can verify they received the correct key. The short 8-character Key ID is derived from the last 8 characters of the fingerprint and can be used for lookups, though it is susceptible to collision attacks (two keys can share the same short ID). Always verify the full fingerprint.

PGP Key Algorithms Explained

OpenPGP supports multiple public key algorithms, each with different security and performance characteristics:

Primary Keys vs. Subkeys

A PGP key is actually a bundle: a primary key plus zero or more subkeys. The primary key certifies the UIDs and other keys. Subkeys handle specific tasks such as signing documents or encrypting messages. This separation allows users to keep the master key offline (reducing exposure) while using subkeys for daily operations. If a subkey is compromised, only that subkey needs to be revoked — the primary key and web of trust remain intact.

This tool lists all subkeys found in the key block, showing each subkey's algorithm, bit length, key ID, creation date, and expiry.

Understanding User IDs and the Web of Trust

A User ID packet contains a free-form string, conventionally formatted as Full Name <email@example.com>. A key can have multiple UIDs — for example, one for a personal email and another for a work email. Each UID can accumulate third-party certifications (signatures from other keys) that form the OpenPGP Web of Trust.

When you receive a PGP key, checking the UIDs lets you confirm who the key belongs to. Cross-referencing UIDs against keyservers (like keys.openpgp.org) can help confirm that the key is well-known and trusted by others.

Key Expiry and Key Hygiene

PGP keys can optionally have an expiry date. This is good practice: an expired key signals that it should no longer be used for new encryption, which limits the damage from key compromise. Expiry can be extended by the key owner by updating the self-signature, without generating a new key. This tool shows both the creation date and expiry date (if set) for the primary key and all subkeys.

Why Parse PGP Keys in the Browser?

Historically, inspecting PGP keys required running gpg --import followed by gpg --list-keys or gpg --fingerprint. That workflow is inaccessible to many users who do not have GPG installed. This browser-based parser offers an instant alternative: paste the key, see the metadata. Nothing is uploaded to a server. The parsing code runs entirely in your local JavaScript engine, making it safe to use even with sensitive key material (though as a general rule, you should never paste private keys into web tools).