Filter by Category

OpenPGP, PGP, and GPG: What is the Difference?

Man considering PGP versus GPG

The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and capabilities.

These are: PGP, Open PGP, and GPG.

Need to protect your files in transit? Try Open PGP in your organization, completely free!

Get Your Download Today


PGP, or Pretty Good Privacy, uses a combination of encryption methodologies such as hashing, data compression, symmetric-key cryptography, and public-key cryptography to keep data secure. PGP can be used to encrypt text files, emails, data files, directories, and disk partitions.

Where did PGP originate? The company PGP Inc. owned the rights to the original PGP encryption software that was released in 1991. This software was developed by Phil Zimmermann & Associates, LLC as a way to ensure the security of files that were posted on pre-internet bulletin boards. PGP changed ownership several times between 1997 and 2010 until it was acquired by Symantec Corporation, who continues to develop the PGP brand today.

Open PGP

Open PGP is a standard of PGP encryption that is open-source for public use. The term "Open PGP" can be used to describe any program that supports the Open PGP system.

Learn More: Everything You Need to Know about PGP Encryption

Zimmerman, an original developer for PGP, began work in the 1990s on an open-source version of PGP encryption that employed encryption algorithms without licensing issues. In 1997, he submitted an open-source PGP (Open PGP) standards proposal to the Internet Engineering Task Force to allow PGP standards-compliant encryption vendors to provide solutions that were compatible with other Open PGP-compliant software vendors. This strategy created an open and competitive environment for PGP encryption tools to thrive.

A variety of popular solutions have developed their PGP encryption products following the Open PGP standards. Some of these products include GoAnywhere Open PGP Studio and GoAnywhere Managed File Transfer.

Learn How to Automate with Open PGP Encryption


GnuPGP, known as GNU Privacy Guard or simply GPG, gives users a GUI for integrating into email and program systems such as Linux. Some software solutions for encryption utilize GPG coding, while others encrypt using command line functions in a menu-based Perl script.

GPG was developed by Werner Koch and released in 1999 as an alternative to Symantec's software suite of encryption tools. It's available as a free software download and is based on the Open PGP encryption standards established by the IETF. This ensures that PGP is interoperable with Symantec's PGP tools, as well as Open PGP standards, and can open and unencrypt any PGP and Open PGP standards file.

Related Reading: PGP vs. GPG: What's the Difference?

Prefer to watch instead of read? Check out this short video!



So, what are the differences between Open PGP, PGP, and GPG?

Open PGP: The IETF-approved standard that describes any encryption technology that uses processes interoperable with PGP.

PGP: A proprietary encryption solution owned by Symantec.

GPG: Another popular solution that follows the Open PGP standard and provides an interface for users to easily encrypt their files.

As the need to encrypt and protect data becomes ever more critical, organizations will continue to develop software based on these three systems.

Start Protecting Your Sensitive File Transfers Today

Download Free Open PGP Software

Related Posts

What Makes FTP an Outdated Security Method

What makes FTP an outdated security method? FTP wasn't designed for the requirements of the modern, globally-connected enterprises we have today. Explore the risks of FTP and benefits of MFT in our latest white paper.

What is MFT and How Does It Work?

What is MFT (Managed File Transfer)? Get the answer, plus learn how using an MFT solution is different than traditional FTP and SFTP tools and scripts.

How to Create a Cybersecurity Policy for Your Organization

4 step guide on how to establish a cybersecurity policy, including templates and examples.

No Such Thing as a Free File Transfer, Part I: How MFT Saves Time

Using basic/free FTP tools could cost your company significantly more than investing in an MFT solution. Learn how MFT has a better ROI than other file transfer methods.