What this tool does
Parses OpenPGP armored messages to identify whether they are encrypted, signed, or both, and shows structural headers.
This page focuses on practical, step‑by‑step usage for **PGP Message Decoder**, with clear examples and common pitfalls.
When you should use it
Use it when you receive a PGP block and need to know what it contains before attempting decryption/verification.
How to use
- Paste the ASCII-armored PGP block.
- The tool identifies message type and packets at a high level.
- Use the output to choose decrypt or verify flow.
Quick example
Example: Tell apart a detached signature block from an encrypted message block.
Notes
Actual decryption requires the private key and should be done in a secure environment.
PGP Message Decoder
Comprehensive PGP analysis with key inspection, message decoding, and signature verification
Complete PGP Analysis:
Analyze public and private PGP keys, extract fingerprints and metadata
Decode PGP messages, extract packets, and analyze structure
Verify PGP signatures and check certificate validity
Check key strength, algorithms, and security configurations
Generate key fingerprints and key IDs for identification
Inspect PGP packet structure and extract detailed information
Check key creation, expiration, and validity timelines
Convert between armored and binary PGP formats
PGP Key Analysis
Analyze PGP public or private keys to extract fingerprints, algorithms, and metadata
PGP Message Analysis
Decode PGP messages, analyze packet structure, and extract content information
PGP Signature Verification
Verify PGP signatures using public keys and check certificate validity
Privacy & Security
We do NOT store or log any PGP keys or messages. All analysis happens locally in your browser.
All PGP analysis happens in your browser - sensitive data never leaves your computer.
We do not track your analysis requests or collect personal information.
Get immediate results without any server processing delays.
PGP Security Best Practices
Use at least 2048-bit RSA or 256-bit ECC keys with strong passphrases.
Regularly rotate your PGP keys and update key revocation certificates.
Always verify key fingerprints through secure channels before use.
PGP Reference Guide
FAQ
Is PGP Message Decoder encryption?
No. It is primarily an analysis/encoding utility. If you need confidentiality, use a real encryption scheme and manage keys properly.
What should I do if the input fails to decode/parse?
Start by checking for missing padding, wrong alphabet/variant, or extra whitespace. If the data looks multi-layered, try decoding step-by-step (e.g., URL decode → Base64 decode).
Is it safe to paste sensitive data here?
For best security, avoid pasting real secrets (private keys, live tokens, seed phrases). Use test data or work offline, especially for anything that could grant access or move funds.