The Locked Door and a Drawn Curtains
Encryption is the process of converting your electronic data into an apparently unreadable format unless you are authorized to view, download or edit the data. A series of mathematical transformations are used to scramble the data so that only a unique “key” or “reverse formula” could descramble the data and make it fit for human understanding.
If someone intercepts that data, all they will see is gibberish and nonsensical information thus protecting your website and its credibility. It’s not about preventing interference; it’s about not letting the intelligible content to a prospective interceptor.
Encryption is the locked door and a drawn curtain that keeps people from seeing and stealing your data.

Encryption in cPanel
cPanel supports encryption through GNU Privacy Guard (abbreviated as GnuPG) a Publicly available encryption Scheme that uses the “public key” approach to encrypt and decrypt messages using mathematical cryptography.
With GnuPG, messages are encrypted using a “public key” however by the sender, they can only be decrypted by a “private key”, which is retained by the intended recipient of the message. For a secured communication you can give your Public key but private key should never be shared.
We have taken a brief overview of how Encryption works in cPanel. Now let us take a look at how we can create, import and delete a GnuPG key.

Creation of GnuPG key
Follow these steps to create a GnuPG key using the cPanel interface-: –
• Open cPanel Email Encryption by clicking on Encryption in the Email section of the cPanel Link.
• This triggers the system to create a New Key Interface. In create a New Key interface, Enter Your name and Email
• Enter comment or nickname; you can use this to distinguish between multiple keys.
• Once you configure a key with the relevant details, you need to provide a strong key password with an expiration date. The expiration date ensures that the encryption you are setting up is time bound. Enter Strong Key Password and Set Expiration Date. Expiration date can be set like
y for year
w for week
d for days

Like your account passwords, a good passphrase is essential for optimal security in GnuPG. For example, mix your passphrase with uppercase and lowercase letters, use numbers, or punctuation marks.
• Select key size from drop-down; larger key sizes are more secure.
• At last click on generate key, after 1-2 minutes your key will be generated.

Import a GnuPG Key

If you already have a key pair in your local computer, then you can import them to your cPanel. You can only import the Public Key by the following given steps: –
• Find Import Key in Encryption Interface. Click on the “Import Key” button
• Paste your Public key in the text box; make sure it includes both the header and footer rows. Then click on the Import Key button to import the key.

Delete a GnuPG Key
If you want to remove a key from your cPanel, Scroll down in Encryption Interface to find the list of keys. Click on the “Delete GnuPG Key” button to remove that key. To delete the keys, delete the private key. The public key will be automatically deleted. Notice that you can’t delete the public key. If you try to delete the public key, you will receive an error message: “Sorry, you must delete the secret key before removing the public key.“
We hope this article will help you in understanding GnuPG keys and Encryption features of cPanel.

A Fully Automated Security Solution
One of the very popular and amazingly helpful automated security solutions, powered by AI, from the makers of CloudLinux is the Imunify 360. Since its release, Imunify 360 has already been installed on thousands of servers, providing security for both hosting providers and their clients. Imunify360 constantly collects and processes a massive amount of information about new attacks from servers all over the world. It analyzes the web traffic that hits your servers, understands all security threats, and uses powerful AI technology to dynamically update its rules and prevent malicious attacks that could cause harm. It uses machine learning technology and extensive, signature-based algorithms to identify patterns of abnormal behavior in near real-time to quickly prevent new attacks. Read more at: