How to convert (ancient) key in "version 2" to more modern "version 4" format?

kwadronaut kwadronaut at
Mon Jun 13 09:28:22 CEST 2016

On 06/09/2016 09:59 PM, Daniel Kahn Gillmor wrote:
> Perhaps the better approach is to have a one-time tool that can either
> (a) translate your encrypted messages into a newer encrypted form
> (e.g. replacing the PKESK packets with ones encrypted to a newer,
> stronger key), or (b) extracting the session key from the encrypted
> object and storing it in a separate lookup table, so that the old secret
> key isn't relevant any longer.
> Either of these approaches would also be useful to people who want to
> destroy their old secret key material without losing access to their
> data, while making it harder for people to start interacting with
> bad/old keys.

Such a tool would indeed be nice. Have you come across one or know of
one? It's probably not straightforward, giving the many formats this
data comes in (inline in e-mails, textfiles, PGP/MIME, …)


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20160613/9c69dff5/attachment.sig>

More information about the Gnupg-users mailing list