O'Reilly logo

Simple Steps to Data Encryption by Peter Loshin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Editing and Revoking a Public Key

“Why would I want to edit my key? What is there to edit? And what about revoking a key?” asks Bob. “You had a lot to say about key revocation earlier, but I still don’t really understand what that means, and how it works. Can you explain?”

Sam responds: “Your public key pair is more than just the raw bits of the public and private keys used for encrypting and digital signing. There are other pieces of data that get bound up with your key pair: the name and e-mail address you enter when you generate the key, the time/date the key was created, the time/date the key expires, even the passphrase you use to protect the key.”

“Some of those things cannot be changed, obviously, like the time/date the key was ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required