I have a public/private key that was generated using pgp 6.5.2 is on
pgp's keyring.  I want to get it on my gnupg 1.0.6 keyring.  First, I exported
and imported my public key.

Then I exported and imported my private key:

export:
[atanner at pelican atanner]$ gpg --armor --export-secret-keys --secret-keyring ~/.pgp/secring.skr 0xAF24A101 > /var/tmp/mykey.sec

import:
[atanner at pelican atanner]$ gpg --import --allow-secret-key-import < /var/tmp/mykey.sec
gpg: Warning: using insecure memory!
gpg: key AF24A101: secret key imported
gpg: Total number processed: 1
gpg:       secret keys read: 1
gpg:   secret keys imported: 1

All appeared to work ok.  ...
[atanner at pelican atanner]$ gpg --list-keys Amy
gpg: Warning: using insecure memory!
pub  2048R/AF24A101 2002-03-26 Amy Tanner <atanner at ahpcrc.org>

However, when I try to sign email in mutt, I get this error:
gpg: Warning: using insecure memory!
gpg: protection algorithm 1 is not supported
gpg: skipped `0xAF24A101': unknown cipher algorithm
gpg: signing failed: unknown cipher algorithm
Press any key to continue...

I believe algorithm 1 is IDEA (can someone confirm?), which doesn't
appear to be supported in my gnupg installation:

[atanner at pelican atanner]$ gpg --version
gpg (GnuPG) 1.0.6
Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

Home: ~/.gnupg
Supported algorithms:
Cipher: 3DES, CAST5, BLOWFISH, RIJNDAEL, RIJNDAEL192, RIJNDAEL256, TWOFISH
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA, ELG
Hash: MD5, SHA1, RIPEMD160


Is there a way to get gnupg to support IDEA?  I saw mention of a plug-in
but couldn't find one.  Or, is there some other problem?  


Also, here are the applicable variables in my .muttrc:

set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f"
set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f"
set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f"
set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"
set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f"
set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose --output - --encrypt --textmode --armor --always-trust --encrypt-to AF24A101 -- -r %r -- %f"
set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --always-trust --encrypt-to AF24A101 -- -r %r -- %f"
set pgp_import_command="gpg --no-verbose --import -v %f"
set pgp_export_command="gpg --no-verbose --export --armor %r"
set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r"
set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r" 
set pgp_list_secring_command="gpg --no-verbose --batch --with-colons --list-secret-keys %r" 
set pgp_autosign=yes
set pgp_sign_as=AF24A101
set pgp_replyencrypt=yes
set pgp_timeout=1800
#set pgp_good_sign="^gpg: Good signature from"

Any help would be appreciated.  Thank you.
-- 
Amy Tanner
amy at real-time.com