Age vs GPG #432
Replies: 3 comments 6 replies
-
|
[I am not an The main difference between GnuPG and Age is simplicity (or complexity if you will):
Regarding your question related to the security of the Age's cipher suite, as said Age uses (based on the specification):
Thus all algorithms are RFC based (and as such at least sound for the purpose), and all are "modern" in the sense that the community doesn't recommend moving from them to better alternatives. (The only slight exception is perhaps The other important observation is that both Have / will I switch from GnuPG to Age? For the moment I've stayed with GnuPG. For a single use-case I've already used Age, and were it not for the #256 issue (i.e. the inability of reading passwords from a file-descriptor) I would have migrated more use-cases towards Age (including decrypting the secret key for disk-encryption on my personal laptop). At the moment Age is missing some UX-critical features (at least for me):
Also I'm still waiting on the fence to see how Age develops further. The initial apeal of Age over GnuPG (at least for me) was the simplicity: one binary to do all it supports, no configuration files, no This is how I view and feel about Age. As said in the beginning, take this only as a personal, somewhat (mis?-)informed opinion. :) |
Beta Was this translation helpful? Give feedback.
-
|
Are there any performance benchmarks made comparing the two? |
Beta Was this translation helpful? Give feedback.
-
I am not a professional developer or cryptographer, just a tech and home-lab enthusiast, with some history in IT, who dabbles in scripts and personal projects on gitlab, so take anything I say with a very large grain of salt, and for exactly what it is, a personal preference that is subject to change should the software landscape evolve, or in light of new information. I personally have "mostly" kept GPG/PGP around for two main reasons.
That said, I've started signing my git commits with my SSH key (ED25519) instead of my GPG key, and I have on a few occasions used AGE to do symmetric encryption of individual files or archives that I back up elsewhere. I use Signal for instant messaging, Wireguard for my home VPN, ChaCha20 for my password manager encryption, etc. I only use PGP to occasionally sign checksum files for releases of my personal projects on gitlab, to sign .deb packages of those same projects with debsigs, and by virtue of the fact my primary email address is ProtonMail, though it has its own key pair that I don't use anywhere outside of Proton. I even recently added Minisign signing to my build script for one of my personal git projects, on the off chance somebody doesn't like PGP and wants to verify the authenticity of a file, though debsigs doesn't support signing a .deb package with Minisign, so I'm only able to use Minisign to sign the checksums file I upload alongside everything else. AGE is the newer tool, with two implementations (Go and Rust) that are more memory safe than PGP (built with C) with a lot less legacy nonsense to have to deal with purely for the sake of compatibility with some 30+ year old system that's using ancient and broken crypto. But, PGP/GPG is still built-into a LOT of things and does support modern algorithms; I migrated my personal PGP key to ECDH and EcDSA (curve 25519) a couple years ago, so at least from my non-expert standpoint, it's more accessible (for now) and appears to be secure enough for the very few things I actually use it for, with support for some modern algorithms. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
This looks like a very nice little tool, the sort I would like to adopt. I have a simple encryption workflow that I use on an almost daily basis, for which I've been using GnuPG with symmetric crypto (
gpg -c) for many years. Can you "sell" me age for this and other basic crypto needs, elevator-pitch style? Although I'm willing to believe it is better than gpg in many ways, switching from a major project which is likely to survive to one which may or may not still be developed in 5 years presents a small risk. What are the marquis advantages? How about the security of the respective ciphers used? I'm a software dev and Gentoo Linux user who tries his best to be an armchair security wonk, although it's hard work :) Thanks.Beta Was this translation helpful? Give feedback.
All reactions