1. Generate a new key
2. List your keyrings, to see the new key
3. Generate a revocation certificate, that will allow you to disable the key, in case something goes wrong.
4. Publish your public key on a key server
5. Verify that publication was successful
6. This is the fingerprint of the key – it can be used to verify that a remote recipient got your public key intact: just ask him/her to tell you the fingerprint!
7. We're done with this test run, we're revoking our keys.
8. Publish the revoked key, so that noone uses the old one.
9. Verify that key has been revoked.