Decrypting with ECDH: no secret key

Daniele Ricci daniele.athome at gmail.com
Wed Jun 26 11:15:56 CEST 2013


Hello,
I'm using a beta version so I think this list is more appropriate than
gnupg-users.
I've been trying 2.1.0 beta3 for elliptic curve encryption and I've
just bumped into an issue:

gpg: encrypted with 256-bit ECDH key, ID 8BA3201C, created 2013-06-16
      "Test ECDSA-ECDH (Key and subkey are 256 bits long)
<test.ecdsa.ecdh at example.com>"
gpg: decryption failed: No secret key

gpg-agent is correctly running and I can export the very same secret
key I've been trying to decrypt with. Here is --list-secret-keys
output:

sec    256E/8C5A3D53 2013-06-16
uid                  Test ECDSA-ECDH (Key and subkey are 256 bits
long) <test.ecdsa.ecdh at example.com>
ssb#   256e/8BA3201C 2013-06-16

Signing and verifying do work.
I've attached the ciphertext and the key pair I'm using.
Cleartext is "This is a simple message.".

Please note that I have 3 installations of gnupg (1.4.12, 2.0.20 from
Debian and 2.1.0beta3 compiled manually), of course I made sure no
other agent was running, environment variables were set correctly for
gnupg beta agent.

Cheers
--
Daniele
-------------- next part --------------
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v2.1.0beta3 (GNU/Linux)

lKUEUb4GwBMIKoZIzj0DAQcCAwS8p3TFaRAx58qCG63W+UNthXBPSJDnVDPTb/sT
iXePaAZ/Gh1GKXTq7k6ab/67MMeVFp/EdySumqdWLtvceFKs/gcDAo11YYCae/K2
1uKGJ/uU4b4QHYnPIsAdYpuo5HIdoAOL/WwduRa8C6vSFrtMJLDqPK3BUpMz3CXN
GyMhjuaHKP5MPbBZkIfgUGZO5qvU9+i0UFRlc3QgRUNEU0EtRUNESCAoS2V5IGFu
ZCBzdWJrZXkgYXJlIDI1NiBiaXRzIGxvbmcpIDx0ZXN0LmVjZHNhLmVjZGhAZXhh
bXBsZS5jb20+iHoEExMIACIFAlG+BsACGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4B
AheAAAoJEPfAOVaMWj1Tk7YBAOLz007oltog5sLreMwxayIBpAesEI+QNkuJuA2/
vcMuAP99qi4fhhkmz5w41AE9Wc/VtobU2lZHmmk3clQsVyuFyg==
=aBzf
-----END PGP PRIVATE KEY BLOCK-----
-------------- next part --------------
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.1.0beta3 (GNU/Linux)
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=17nm
-----END PGP PUBLIC KEY BLOCK-----
-------------- next part --------------
-----BEGIN PGP MESSAGE-----
Version: GnuPG v2.1.0beta3 (GNU/Linux)

hH4Dp5+FdoujIBwSAgMErx4BSvgXY3irwthgxU8zPoAoR+8rhmxdpwbw6ZJAO2GX
azWJ85JNcobHKDeGeUq6wkTFu+g6yG99gIX8J5xJAjBRhyCRcaFgwbdDV4orWTe3
iewiT8qs4BQ23e0c8t+thdKoK4thMsCJy7wSKqY0sJTSVAELroNbCOi2lcO15YmW
6HiuFH7VKWcxPUBjXwf5+Z3uOKEp28tBgNyDrdbr1BbqlgYzIKq/pe9zUbUXfitn
vFc6HcGhvmRQreQ+Yw1x3x0HJeoPwg==
=HKTh
-----END PGP MESSAGE-----


More information about the Gnupg-devel mailing list