I have been testing out GPG keys and were studying the changes of the keys when adding/removing users on the key. If I add a user Alice upon key generation. I export the key pairs's public and private key. And then add the user Bob to the same key. And Finally export the same key except with Bob added as a user. Then I compare the Alice and Alice/Bob keys. The Alice public key has a huge chunk similar to the Alice/Bob public keys and also has a few differences in many spots. The Alice/Bob public key is considerably longer than the Alice key. I notice the same applies for the private keys. What I find interesting is that if I encrypt using the Alice Public Key and decrypt using the Alice/Bob private key, I get the same message.
Here are the questions I have:
- Does email/User ID affect the public and private key?
- Can you extract the user id from the public key? If yes, how does it work?
- How does the encryption with Alice and decryption with Alice/Bob work?
- Is a certain part of each key used for encryption/decryption and other parts left for the user id and emails?