Age Encryption - Modern Encryption Tool
Basic Information
- Product Name: Age (Actually Good Encryption)
- Developer: Filippo Valsorda (former Go security team member)
- Country/Region: USA/Italy
- Official Website: https://age-encryption.org/
- GitHub: https://github.com/FiloSottile/age
- Type: Open-source modern file encryption tool
- License: BSD-3-Clause
- First Release: 2019
Product Description
Age is a simple, modern, and secure file encryption tool (also a Go library) designed with small, explicit keys, zero configuration options, and UNIX-style composability in mind. Age is designed as a modern alternative to GPG, removing GPG's complexity and providing a tool that "does one thing and does it well."
Core Features/Characteristics
- Minimalist Design: No configuration options, strong default security parameters
- Post-Quantum Support: Added ML-KEM-768-based post-quantum recipient (age1pq1... prefix) in v1.3.0
- Small Keys: Explicit, easy-to-manage key formats
- UNIX Composability: Designed for pipeline and script composition
- Plugin Architecture: Supports hardware keys like age-plugin-yubikey
- YubiKey Support: Supports hardware PIV tokens via plugins
- Streaming Encryption: Supports streaming encryption/decryption for large files
- Seeking Decryption: DecryptReaderAt API supports random access (e.g., zip files)
Key Formats
# Public Key (Recipient)
age1... (X25519)
age1pq1... (Post-quantum, ML-KEM-768 hybrid)
# Private Key (Identity)
AGE-SECRET-KEY-1...
AGE-SECRET-KEY-PQ-1... (Post-quantum)
Business Model
Completely free and open-source (BSD-3-Clause license). Filippo Valsorda earns income through independent maintainer sponsorships.
Pricing
Completely free.
Use Cases
- File and backup encryption
- Configuration file encryption with SOPS
- Encryption operations in scripts and automation
- SSH key reuse (supports ssh-rsa and ssh-ed25519)
- Secure transmission of sensitive data
Relationship with OpenClaw
- Configuration Encryption: Use Age to encrypt OpenClaw's API keys and sensitive configurations
- Backup Encryption: Encrypt OpenClaw's local database backups
- SOPS Backend: Serve as SOPS's encryption backend to manage OpenClaw's configuration keys
- Post-Quantum Security: Post-quantum support in v1.3.0 provides future-proof security for OpenClaw data
- Automation-Friendly: Command-line tool easily integrates into OpenClaw's automation workflows
Advantages
- Minimalist design, almost zero learning curve
- Post-quantum encryption support (ML-KEM-768)
- No configuration files, avoiding configuration errors
- Good integration with ecosystems like SOPS and SSH keys
- Active development and maintenance
- BSD license, no usage restrictions
Limitations
- Only for file encryption, does not support email signing, etc.
- Does not support trust models like Web of Trust
- Ecosystem not as mature as GPG
- Does not support key server distribution
- Not suitable for scenarios requiring complex key management
Competitor Comparison
| Feature | Age | GPG | OpenSSL | Rage (Rust Implementation) |
|---|---|---|---|---|
| Simplicity | Very High | Low | Low | Very High |
| Post-Quantum | Yes (v1.3) | No | No | Yes |
| Configuration | Zero Configuration | Complex | Requires Parameters | Zero Configuration |
| Use Case | File Encryption | Encryption/Signing | General Cryptography | File Encryption |
| Email Encryption | No | Yes | No | No |