I have a public/private key that was generated using pgp 6.5.2 is on pgp's keyring. I want to get it on my gnupg 1.0.6 keyring. First, I exported and imported my public key. Then I exported and imported my private key: export: [atanner at pelican atanner]$ gpg --armor --export-secret-keys --secret-keyring ~/.pgp/secring.skr 0xAF24A101 > /var/tmp/mykey.sec import: [atanner at pelican atanner]$ gpg --import --allow-secret-key-import < /var/tmp/mykey.sec gpg: Warning: using insecure memory! gpg: key AF24A101: secret key imported gpg: Total number processed: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 All appeared to work ok. ... [atanner at pelican atanner]$ gpg --list-keys Amy gpg: Warning: using insecure memory! pub 2048R/AF24A101 2002-03-26 Amy Tanner <atanner at ahpcrc.org> However, when I try to sign email in mutt, I get this error: gpg: Warning: using insecure memory! gpg: protection algorithm 1 is not supported gpg: skipped `0xAF24A101': unknown cipher algorithm gpg: signing failed: unknown cipher algorithm Press any key to continue... I believe algorithm 1 is IDEA (can someone confirm?), which doesn't appear to be supported in my gnupg installation: [atanner at pelican atanner]$ gpg --version gpg (GnuPG) 1.0.6 Copyright (C) 2001 Free Software Foundation, Inc. This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions. See the file COPYING for details. Home: ~/.gnupg Supported algorithms: Cipher: 3DES, CAST5, BLOWFISH, RIJNDAEL, RIJNDAEL192, RIJNDAEL256, TWOFISH Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA, ELG Hash: MD5, SHA1, RIPEMD160 Is there a way to get gnupg to support IDEA? I saw mention of a plug-in but couldn't find one. Or, is there some other problem? Also, here are the applicable variables in my .muttrc: set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f" set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f" set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f" set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f" set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose --output - --encrypt --textmode --armor --always-trust --encrypt-to AF24A101 -- -r %r -- %f" set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --always-trust --encrypt-to AF24A101 -- -r %r -- %f" set pgp_import_command="gpg --no-verbose --import -v %f" set pgp_export_command="gpg --no-verbose --export --armor %r" set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r" set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r" set pgp_list_secring_command="gpg --no-verbose --batch --with-colons --list-secret-keys %r" set pgp_autosign=yes set pgp_sign_as=AF24A101 set pgp_replyencrypt=yes set pgp_timeout=1800 #set pgp_good_sign="^gpg: Good signature from" Any help would be appreciated. Thank you. -- Amy Tanner amy at real-time.com