>when Disastry's build is configured intentionally to used twofish >and sha-256 >then there is nothing i can tweak in gnupg to get it to decrypt ;- ((
>here is the file: -----BEGIN PGP MESSAGE----- Version: 2.6.3ia-multi06 comment: (symmetric encryption, twofish) (passphrase: s) pgAAACf8AkWW05d5cxJZMREI8uZxtVsHq07rSnCLLYaRYGTBXAi6bw8HJSo= =Z5/z -----END PGP MESSAGE----- i must say, that the more i use gnupg, the more impressed i become, and think it is the *ultimate* crypto program! (Thanks to all involved in its development and maintenance !!!) so, starting with this strong feeling, that there just *must* be a way to do this in gnupg, have found it: when symmetric encryption is used in pgp, it uses the preferred hash, so all that is necessary in gnupg to decrypt it, is to run gpg --list-packets, find the symmetric algorithm and hash, and then put them as option is gpg.conf so, since sha-256 and twofish were used, i put these options back: cipher-algo twofish digest-algo SHA256 s2k-cipher-algo twofish s2k-digest-algo SHA256 then simply used the command: c:\gnupg>gpg --pgp2 e:\tftjtju.asc gpg: armor: BEGIN PGP MESSAGE gpg: armor header: Version: 2.6.3ia-multi06 gpg: armor header: comment: (symmetric encryption, twofish) (passphrase: s) :encrypted data packet: length: 39 gpg: assuming TWOFISH encrypted data Enter passphrase: :literal data packet: mode t (74), created 0, name="tft.txt", raw data: 3 bytes gpg: original file name='tft.txt' gpg: decryption okay gpg: WARNING: message was not integrity protected gpg: session key: `10:03C7C0ACE395D80182DB07AE2C30F0343EC2A809CE5FFC324B96A03F81CCC1DF ' Thanks All, vedaal Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users