➜  ~ export LANG=C
➜  ~ gpg2 --expert --full-gen-key
gpg (GnuPG) 2.1.11; Copyright (C) 2016 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)
   (7) DSA (set your own capabilities)
   (8) RSA (set your own capabilities)
   (9) ECC and ECC
  (10) ECC (sign only)
  (11) ECC (set your own capabilities)
Your selection? 9
Please select which elliptic curve you want:
   (2) NIST P-256
   (3) NIST P-384
   (4) NIST P-521
   (5) Brainpool P-256
   (6) Brainpool P-384
   (7) Brainpool P-512
Your selection? 4
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0) 1y
Key expires at Wed Mar 28 22:19:23 2018 JST
Is this correct? (y/N) y

GnuPG needs to construct a user ID to identify your key.

Real name: Kyohei Moriyama
Email address: xxxxxxxxxxxxxxxxxx@microsoft.com
Comment: sasukeh
You selected this USER-ID:
    "Kyohei Moriyama (sasukeh) <xxxxxxxxxxxxxxxxxxxx@microsoft.com>"

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key 830BA267 marked as ultimately trusted
gpg: revocation certificate stored as '/home/sasukeh/.gnupg/openpgp-revocs.d/xxxxxxxxxxxxxxxxxxxx.rev'
public and secret key created and signed.

gpg: checking the trustdb
gpg: marginals needed: 3  completes needed: 1  trust model: PGP
gpg: depth: 0  valid:   2  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 2u
gpg: next trustdb check due at 2018-03-28
pub   nistp521/830BA267 2017-03-28 [S] [expires: 2018-03-28]
      Key fingerprint = C439 FB3B 6D41 A955 41B2  53A4 DBF4 E59F 830B A267
uid         [ultimate] Kyohei Moriyama (sasukeh) <xxxxxxxxxxxxxxxx@microsoft.com>
sub   nistp521/BF2808B9 2017-03-28 [] [expires: 2018-03-28]

pub 4096R/102EFFB8 2017-04-02 Kyohei Moriyama (sasukeh) flogofrein@gmail.com
Primary key fingerprint: 2BE2 1FA9 8F72 C692 1E37 6072 5440 EEBA 102E FFB8