Solved

PGP Decryption - Manual vs programmatically

Posted on 2006-10-25
4
1,950 Views
Last Modified: 2007-12-19
I've inherited an old application that uses PGP 6.5.2 and VB6. I am trying to decrypt a file from a vendor. I am able to decrypt it if I right-mouse-click on it in Windows Explorer and select PGP, Decrypt. But if I try to do it programmatically I get a "PGP Error 32: Decryption Error." Encrypted files from other vendors can be decrypted programmatically without a problem.

I'm new to PGP so I don't know if a problem with the public key for this vendor could cause it to behave that way. Any suggestions are greatly appreciated!

Thanks...
MK
0
Comment
Question by:MDCPS
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
mahe2000 earned 150 total points
ID: 17808987
why don't you try GPG API (it's free) and/or GPGME
http://www.gnupg.org/related_software/gpgme/
0
 

Author Comment

by:MDCPS
ID: 17810835
I wish, but they want the least changes possible. Just enough to fix this one file. I'll keep it in mind as a last resort, though. Thanks!
0
 
LVL 14

Assisted Solution

by:chris_calabrese
chris_calabrese earned 150 total points
ID: 17812197
Also FYI PGP 6.51 is a) no longer supported, and b) has known security vulnerabilities.
0
 

Author Comment

by:MDCPS
ID: 17834362
I just found out they are using GPG version 1.2.1. At this point, I don't have any more time to devote to this, so I'll keep doing it manually. I'll go ahead and split the points.

Thanks...
MK
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question