Protect text with flexible encryption and readable output. Paste keys, sign optionally, preview armored blocks. Save reports for audits, compliance checks, and secure records.
Tip: Keep private keys private. Use signing only when the private key owner authorizes it.
| Field | Example Value | Purpose |
|---|---|---|
| Plaintext Message | Quarterly cost forecast approved for distribution. | Content that will be encrypted for the recipient. |
| Recipient Public Key | -----BEGIN PGP PUBLIC KEY BLOCK----- | Key material used to lock the message. |
| Signing Key | Optional private key block | Used only when authenticity proof is needed. |
| Armor Output | Yes | Generates text-safe armored output for easy sharing. |
| Compression | ZLIB | Reduces size before encryption in supported workflows. |
PGP encryption is a hybrid cryptography workflow rather than one simple arithmetic formula. A session key is generated first, then the message is encrypted with that symmetric key, and finally the session key is encrypted with the recipient’s public key.
Where M is the plaintext, H(M) is the message hash, Kpub is the recipient public key, and Kpriv is the optional signing private key.
It encrypts plaintext with a recipient public key and can optionally add a signature. The result is shown in armored text for convenient copying or recordkeeping.
Yes. The page uses an OpenPGP library in the browser to perform public key encryption. Your message is processed client-side after the page loads.
Public key encryption needs the recipient’s public key to lock the message. Only the matching private key can decrypt the protected content later.
Add a signing private key when the recipient must verify who created the message. Signing proves origin and helps detect unauthorized content changes.
ASCII armor converts binary encrypted data into text blocks. This makes it easier to paste into email, tickets, documentation, and text files.
Compression mainly reduces message size before encryption. It can help transport efficiency, but the main security benefits still come from encryption and key management.
The CSV export stores a compact record of your inputs and generated status, including message length, armor choice, compression mode, and the produced encrypted result.
This version focuses on encryption and optional signing. A separate decrypt workflow should be used when you need private key input and message verification.
Status:
Message Length:
Armor Output:
Compression:
File Name:
Note:
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.