The three keys in the keyring above serve different purposes, as explained below.
pub 2048R/B85BE088 2002-03-19 Florian Weimer (CERTIFICATION KEY) <openpgp-ca@deneb.enyo.de> Key fingerprint = 231C B80B 399D 0B0A 9797 5320 288B 8F04 B85B E088
This my certification key. I use it to sign other OpenPGP keys and key validity statements.
pub 2048R/02D524BE 2002-03-19 Florian Weimer (HIGH SECURITY KEY) <fw@deneb.enyo.de> Key fingerprint = C8D3 D9CF FA9E 7056 3F32 FA54 BF7B FF04 02D5 24BE uid Florian Weimer (HIGH SECURITY KEY) <Weimer@CERT.Uni-Stuttgart.DE> uid Florian Weimer (HIGH SECURITY KEY) <Florian.Weimer@RUS.Uni-Stuttgart.DE> sub 2048R/2450A7B1 2002-03-19
I use this key for sigining critical documents (such as official software releases).
Please do not encrypt to this key unless you think that it's strictly necessary. Decryption is much easier for me if you use the low security key below.
pub 2048R/56A3416B 2002-03-19 Florian Weimer (LOW SECURITY KEY) <fw@deneb.enyo.de> Key fingerprint = ED96 4B45 3A28 AA3D C0A7 6796 63A9 C78A 56A3 416B uid Florian Weimer (LOW SECURITY KEY) <Weimer@CERT.Uni-Stuttgart.DE> uid Florian Weimer (LOW SECURITY KEY) <Florian.Weimer@RUS.Uni-Stuttgart.DE> sub 2048R/F8D7F8C3 2002-03-19
This key is used for day-to-day communication. The private key material is stored on a multi-user machine and therefore exposed to a number of people I trust.
Note: The widely used pks
keyserver software miscalculates the key ID of RSA V4 keys. This means you cannot retrieve my keys from most keyservers by querying for the key ID. Retrieving the keys by user ID does work, though.
2002-10-03: published
2002-10-21: minor changes
2003-07-30: reformatted