To identify the keys you want to export, run:
gpg --list-secret-keys --keyid-format=longExample output:
sec rsa4096/ABCDEFGH12345678 2023-01-01 [SC]
Key fingerprint = 1234 5678 9ABC DEFG HIJK LMNO PQRS TUVW XYZA BCDE
uid [ultimate] Your Name <your@email.com>
ssb rsa4096/IJKLMNOP12345678 2023-01-01 [E]
Replace ABCDEFGH12345678 with your key ID and run:
gpg --export-secret-keys --armor ABCDEFGH12345678 > gpg-private-key.ascgpg --export --armor ABCDEFGH12345678 > gpg-public-key.ascgpg --export-ownertrust > gpg-trust.txtTo keep your backup organized and easy to transfer, you can compress the exported files into a single archive:
tar -czvf gpg-keys-backup.tar.gz gpg-private-key.asc gpg-public-key.asc gpg-trust.txtIf you backed up your keys as an archive, extract them first:
tar -xzvf gpg-keys-backup.tar.gzThen import the keys:
gpg --import gpg-public-key.asc
gpg --import gpg-private-key.asc
gpg --import-ownertrust < gpg-trust.txtVerify your keys:
gpg --list-secret-keysNow you're ready to use your GPG keys again! 🚀