Solved

PGP Decryption - Manual vs programmatically

Posted on 2006-10-25
4
1,960 Views
Last Modified: 2007-12-19
I've inherited an old application that uses PGP 6.5.2 and VB6. I am trying to decrypt a file from a vendor. I am able to decrypt it if I right-mouse-click on it in Windows Explorer and select PGP, Decrypt. But if I try to do it programmatically I get a "PGP Error 32: Decryption Error." Encrypted files from other vendors can be decrypted programmatically without a problem.

I'm new to PGP so I don't know if a problem with the public key for this vendor could cause it to behave that way. Any suggestions are greatly appreciated!

Thanks...
MK
0
Comment
Question by:MDCPS
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
mahe2000 earned 150 total points
ID: 17808987
why don't you try GPG API (it's free) and/or GPGME
http://www.gnupg.org/related_software/gpgme/
0
 

Author Comment

by:MDCPS
ID: 17810835
I wish, but they want the least changes possible. Just enough to fix this one file. I'll keep it in mind as a last resort, though. Thanks!
0
 
LVL 14

Assisted Solution

by:chris_calabrese
chris_calabrese earned 150 total points
ID: 17812197
Also FYI PGP 6.51 is a) no longer supported, and b) has known security vulnerabilities.
0
 

Author Comment

by:MDCPS
ID: 17834362
I just found out they are using GPG version 1.2.1. At this point, I don't have any more time to devote to this, so I'll keep doing it manually. I'll go ahead and split the points.

Thanks...
MK
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question