Most linux distributions include gnupg, depending on distribution the command is "gpg" or "gpg2"
"gnupg manuals" on duckduckgo, it should be the first result.
Widely used commands:
gpg --full-generate-key
gpg --export --armor <key name or key fingerprint>
gpg --import
gpg --list-keys <partial key name or key fingerprint>
gpg --encrypt --armor -r <key name or key fingerprint> (can be your own key or an imported key, to set the trust level)
gpg --edit-key <key name or key fingerprint>, notable command is "trust" to set a key trust level or "expire" to edit key expiration date
gpg -u <your key fingerprint> --clearsign
gpg --verify
Identifying keys by fingerprint is more reliable than using names or emails.
"gnupg manuals" on duckduckgo, it should be the first result.
Widely used commands:
gpg --full-generate-key
gpg --export --armor <key name or key fingerprint>
gpg --import
gpg --list-keys <partial key name or key fingerprint>
gpg --encrypt --armor -r <key name or key fingerprint> (can be your own key or an imported key, to set the trust level)
gpg --edit-key <key name or key fingerprint>, notable command is "trust" to set a key trust level or "expire" to edit key expiration date
gpg -u <your key fingerprint> --clearsign
gpg --verify
Identifying keys by fingerprint is more reliable than using names or emails.