PGP Public keys
You may find below a list of public PGP keys you may use to communicate with INCIBE-CERT.
By using asymmetric cryptography, the public keys may be known by the public at large, which is then able to use it to encrypt emails directed to INCIBE-CERT and verify the authenticity of emails sent by INCIBE-CERT, whereas the content protected by such public key can only be decrypted by INCIBE-CERT.
CERT Contact (NON-incidents)
You can verify the contents of this file by loading the key into your keyring, and issuing the command:
$ gpg -k
pub ed25519 2024-06-04 [SC] [expires: 2026-06-15]
C50CD6F58E6D513AF09547E4EB5BA6FCEB9A069A
uid [ ultimate ] INCIBE-CERT Team (2024-2026) <>
sub cv25519 2024-06-04 [E] [expires: 2026-06-15]
sub ed25519 2024-06-04 [S] [expires: 2026-06-15]Download the public key (cert.pub or cert.asc) for email ![]()
General Incidents (Enterprises and Individuals)
You can verify the contents of this file by loading the key into your keyring, and issuing the command:
$ gpg -k
pub ed25519 2024-06-04 [SC] [expires: 2026-06-15]
51278C466B8657B62661C2C39699FDB2EC855918
uid [ full ] INCIBE-CERT incidents (2024 - 2026) <>
sub cv25519 2024-06-04 [E] [expires: 2026-06-15]
sub ed25519 2024-06-04 [S] [expires: 2026-06-15]
If you require further information or you have any question, you could contact us by ![]()
Download the public key (incidencias.pub or incidencias.asc) for email ![]()
Critical Infrastructures Incidents
You can verify the contents of this file by loading the key into your keyring, and issuing the command:
$ gpg -k
pub ed25519 2024-06-04 [SC] [expires: 2026-06-15]
863410B7462819769FC3D92C65C9CFC31508BC70
uid [ full ] INCIBE-CERT for critical infrastructures (2024 - 2026) <>
sub cv25519 2024-06-04 [E] [expires: 2026-06-15]
sub ed25519 2024-06-04 [S] [expires: 2026-06-15]
If you require further information or you have any question, you could contact us by ![]()
Download the public key (pic.pub or pic.asc) for email ![]()
CERT contact for Digital Service Providers (NON-incidents)
You can verify the contents of this file by loading the key into your keyring, and issuing the command:
$ gpg -k
pub ed25519 2024-06-04 [SC] [expires: 2026-06-15]
08794B827698690D18E48F77B76816850CBDD990
uid [ full ] INCIBE-CERT services (2024 - 2026) <>
sub cv25519 2024-06-04 [E] [expires: 2026-06-15]
sub ed25519 2024-06-04 [S] [expires: 2026-06-15]
If you require further information or you have any question, you could contact us by ![]()
Download the public key (servicios.pub or servicios.asc) for email ![]()
INCIBE-CERT CNA contact
You can verify the contents of this file by loading the key into your keyring, and issuing the command:
$ gpg -k
pub rsa4096 2025-05-09 [SC] [expires: 2027-05-19]
2F76A1196716D957D6885F7CD1DCFF0DA141BDFD
uid [ ultimate ] Spanish National CNA (2025-2027)
sub rsa4096 2025-05-09 [E] [expires: 2027-05-19]
Download the public key (cve-coordination.pub or cve-coordination.asc) for email ![]()
RedIRIS Incidents
You can verify the contents of this file by loading the key into your keyring, and issuing the command:
$ gpg -k
pub rsa4096 2012-05-16 [SC] [expires: 2025-01-01]
D2DE 1DBE F689 ED1E 0312 34D9 8984 EB58 2006 B232
uid [ full ] <>
uid [ unknown ] IRIS-CERT <>
uid [ unknown ] <>
sub rsa4096 2024-05-31 [E] [expires: 2025-01-01]
sub rsa4096 2024-05-31 [S] [expires: 2025-01-01]



