Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

PGP Decryption - Manual vs programmatically

Posted on 2006-10-25
4
Medium Priority
?
1,978 Views
Last Modified: 2007-12-19
I've inherited an old application that uses PGP 6.5.2 and VB6. I am trying to decrypt a file from a vendor. I am able to decrypt it if I right-mouse-click on it in Windows Explorer and select PGP, Decrypt. But if I try to do it programmatically I get a "PGP Error 32: Decryption Error." Encrypted files from other vendors can be decrypted programmatically without a problem.

I'm new to PGP so I don't know if a problem with the public key for this vendor could cause it to behave that way. Any suggestions are greatly appreciated!

Thanks...
MK
0
Comment
Question by:MDCPS
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
mahe2000 earned 450 total points
ID: 17808987
why don't you try GPG API (it's free) and/or GPGME
http://www.gnupg.org/related_software/gpgme/
0
 

Author Comment

by:MDCPS
ID: 17810835
I wish, but they want the least changes possible. Just enough to fix this one file. I'll keep it in mind as a last resort, though. Thanks!
0
 
LVL 14

Assisted Solution

by:chris_calabrese
chris_calabrese earned 450 total points
ID: 17812197
Also FYI PGP 6.51 is a) no longer supported, and b) has known security vulnerabilities.
0
 

Author Comment

by:MDCPS
ID: 17834362
I just found out they are using GPG version 1.2.1. At this point, I don't have any more time to devote to this, so I'll keep doing it manually. I'll go ahead and split the points.

Thanks...
MK
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question