Filter by Category

PGP vs. GPG: What's the Difference?

the difference between PGP and GPG

PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially PGP vs. GPG, you’re not alone! Read this article to get a better feel for these standards and their nuances.

PGP – Pretty Good Privacy

PGP stands for Pretty Good Privacy. It was created in the 1990s and is currently owned by security software company Symantec. Over the course of nearly three decades, PGP has been developed, improved, and updated, making it the standard option for file encryption today.

PGP uses several encryption technologies, like hashing, data compression, and public/private PGP keys to protect an organization’s critical information (i.e., the company’s crown jewels). While it’s often used to encrypt files before exchanging them with trading partners or remote locations, PGP can also encrypt emails, directories, and disk partitions, so it's a fitting solution for modern cybersecurity needs.

What about Open PGP?

PGP is the backbone of Open PGP, which is an open source standard that allows PGP to be used in software that is typically free to the public. The term “Open PGP” is often applied to tools, features, or solutions that support open-source PGP encryption technology.

Vendors who want to include Open PGP in their solutions must follow IETF (Internet Engineering Task Force) standards and integrate well with other Open PGP-compliant software vendors. If you’re in the market for an Open PGP tool, vendors who are members of the Open PGP Alliance will give you confidence that your files can be decrypted and verified by other IETF standard Open PGP solutions.

GPG – GNU Privacy Guard

GPG, or GnuPG, stands for GNU Privacy Guard. GPG is a different implementation of the Open PGP standard and a strong alternative to Symantec’s official PGP software.

GPG is defined by RFC 4880 (the official name for the Open PGP standard). The GPG Project provides the tools and libraries to allows users to interface with a GUI or command line to integrate encryption with emails and operating systems like Linux. GPG can open and decrypt files encrypted by PGP or Open PGP, meaning it works well with other products.

What’s the Difference Between PGP and GPG?

PGP is a proprietary solution owned by Symantec, and GPG is an open source standard. Functionally, each format are virtually identical.

If you’re looking for a free PGP tool that supports basic encryption, decryption, file signing, and document verification, GoAnywhere Open PGP Studio is a perfect desktop solution for IT users and teams.

If you need to integrate your PGP encryption/decryption processes into a solution that also supports enterprise-level compliance, automation, auditing, reporting, and more, GoAnywhere Managed File Transfer supports Open PGP encryption alongside industry-standard file transfer protocols, internal collaboration features, and robust security settings.

Protect Your Files in Transit and at Rest

GoAnywhere's solutions support Open PGP and GPG for encrypted file transfer.

For an enterprise solution, you can request a personalized demo of GoAnywhere MFT to see if it's the right product for your encryption requirements, or simply download our Open PGP Studio to get started with free desktop file encryption today.

Get the privacy your files need with GoAnywhere’s strong encryption technologies:

REQUEST A SHORT DEMO

Latest Posts


6 Ways to Get Internal Buy-In for Your MFT Solution

June 21, 2019

There are a lot of moving pieces that go into a product evaluation. You need to navigate through the myriad of options in today's marketplace, attend vendor demonstrations, try the software in a test…


What is a DMZ and Why Do You Need a DMZ Gateway?

June 19, 2019

If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship…


Eight Hacks You Can Implement to Combat "Hackable" Network Vulnerabilities

June 18, 2019

Although we’re becoming savvier to the tricks hackers have pulled in the past, they are still working to up their game and catch us where and when we least expect it. Fortunately, there are some…


How to Achieve SFTP Automation in Your Organization

June 17, 2019

Whether you regularly receive 10 or 10,000 file transfers from your SFTP partners, it can be frustrating to go in and manually retrieve, unencrypt, and process these documents. Not only is this…


How SFTP Works

June 13, 2019

How does SFTP work?When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP (which stands for SSH File Transfer Protocol or Secure…