Unfortunately, there's not an easy way to import one of these keys for use with SecureCRT at the moment. I'll add a feature request for the capability of easily importing such keys for use with SecureCRT, but in the meantime, you might be interested in the following workaround.
Once you have the new private key generated, you'll need to copy the key to a linux/unix machine and convert the key to an openssh key using the openssh ssh-keygen utility. Here's how I was able to do it (I'm using the example private key available from the following Amazon (web page (http://docs.amazonwebservices.com/AmazonEC2/gsg/2007-01-03/running-an-instance.html)). I copied the private key text from Amazon's web site and pasted it into a vi session while connected with SecureCRT to a Redhat Linux system. Here's what the process looked like:
redhat [~/.ssh]-> vi AmazonEC2Key
[Go into insert mode and paste here, then save file and exit vi]
redhat [~/.ssh]-> cat AmazonEC2Key
-----BEGIN RSA PRIVATE KEY-----
MIIEoQIBAAKCAQBuLFg5ujHrtm1jnutSuoO8Xe56LlT+HM8v/xkaa39EstM3/aFxTHgElQiJLChp
HungXQ29VTc8rc1bW0lkdi23OH5eqkMHGhvEwqa0HWASUMll4o 3o/IX+0f2UcPoKCOVUR+jx71Sg
5AU52EQfanIn3ZQ8lFW7Edp5a3q4DhjGlUKToHVbicL5E+g45z fB95wIyywWZfeW/UUF3LpGZyq/
ebIUlq1qTbHkLbCC2r7RTn8vpQWp47BGVYGtGSBMpTRP5hnbzz uqj3itkiLHjU39S2sJCJ0TrJx5
i8BygR4s3mHKBj8l+ePQxG1kGbF6R4yg6sECmXn17MRQVXODNH ZbAgMBAAECggEAY1tsiUsIwDl5
91CXirkYGuVfLyLflXenxfI50mDFms/mumTqloHO7tr0oriHDR5K7wMcY/YY5YkcXNo7mvUVD1pM
ZNUJs7rw9gZRTrf7LylaJ58kOcyajw8TsC4e4LPbFaHwS1d6K8 rXh64o6WgW4SrsB6ICmr1kGQI7
3wcfgt5ecIu4TZf0OE9IHjn+2eRlsrjBdeORi7KiUNC/pAG23I6MdDOFEQRcCSigCj+4/mciFUSA
SWS4dMbrpb9FNSIcf9dcLxVM7/6KxgJNfZc9XWzUw77Jg8x92Zd0fVhHOux5IZC+UvSKWB4dyfcI
tE8C3p9bbU9VGyY5vLCAiIb4qQKBgQDLiO24GXrIkswF32YtBB MuVgLGCwU9h9HlO9mKAc2m8Cm1
jUE5IpzRjTedc9I2qiIMUTwtgnw42auSCzbUeYMURPtDqyQ7p6 AjMujp9EPemcSVOK9vXYL0Ptco
xW9MC0dtV6iPkCN7gOqiZXPRKaFbWADp16p8UAIvS/a5XXk5jwKBgQCKkpHi2EISh1uRkhxljyWC
iDCiK6JBRsMvpLbc0v5dKwP5alo1fmdR5PJaV2qvZSj5CYNpMA y1/EDNTY5OSIJU+0KFmQbyhsbm
rdLNLDL4+TcnT7c62/aH01ohYaf/VCbRhtLlBfqGoQc7+sAc8vmKkesnF7CqCEKDyF/dhrxYdQKB
gC0iZzzNAapayz1+JcVTwwEid6j9JqNXbBc+Z2YwMi+T0Fv/P/hwkX/ypeOXnIUcw0Ih/YtGBVAC
DQbsz7LcY1HqXiHKYNWNvXgwwO+oiChjxvEkSdsTTIfnK4VSCv U9BxDbQHjdiNDJbL6oar92UN7V
rBYvChJZF7LvUH4YmVpHAoGAbZ2X7XvoeEO+uZ58/BGKOIGHByHBDiXtzMhdJr15HTYjxK7OgTZm
gK+8zp4L9IbvLGDMJO8vft32XPEWuvI8twCzFH+CsWLQADZMZK SsBasOZ/h1FwhdMgCMcY+Qlzd4
JZKjTSu3i7vhvx6RzdSedXEMNTZWN4qlIx3kR5aHcukCgYA9T+ Zrvm1F0seQPbLknn7EqhXIjBaT
P8TTvW/6bdPi23ExzxZn7KOdrfclYRph1LHMpAONv/x2xALIf91UB+v5ohy1oDoasL0gij1houRe
2ERKKdwz0ZL9SWq6VTdhr/5G994CK72fy5WhyERbDjUIdHaK3M849JJuf8cSrvSb4g==
-----END RSA PRIVATE KEY-----
[ now fix file permissions on this so that ssh-keygen doesn't bark at you]
redhat [~/.ssh]-> chmod og-r AmazonEC2Key
[ Now run ssh-keygen to rewrite the key in the OpenSSH format ]
redhat [~/.ssh]-> ssh-keygen -p -f AmazonEC2Key
Key has comment 'AmazonEC2Key'
Enter new passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved with the new passphrase.
[ See how the written format compares with the original format above ]
redhat [~/.ssh]-> cat AmazonEC2Key
-----BEGIN RSA PRIVATE KEY-----
MIIEoQIBAAKCAQBuLFg5ujHrtm1jnutSuoO8Xe56LlT+HM8v/xkaa39EstM3/aFx
THgElQiJLChpHungXQ29VTc8rc1bW0lkdi23OH5eqkMHGhvEwq a0HWASUMll4o3o
/IX+0f2UcPoKCOVUR+jx71Sg5AU52EQfanIn3ZQ8lFW7Edp5a3q 4DhjGlUKToHVb
icL5E+g45zfB95wIyywWZfeW/UUF3LpGZyq/ebIUlq1qTbHkLbCC2r7RTn8vpQWp
47BGVYGtGSBMpTRP5hnbzzuqj3itkiLHjU39S2sJCJ0TrJx5i8 BygR4s3mHKBj8l
+ePQxG1kGbF6R4yg6sECmXn17MRQVXODNHZbAgMBAAECggEAY1 tsiUsIwDl591CX
irkYGuVfLyLflXenxfI50mDFms/mumTqloHO7tr0oriHDR5K7wMcY/YY5YkcXNo7
mvUVD1pMZNUJs7rw9gZRTrf7LylaJ58kOcyajw8TsC4e4LPbFa HwS1d6K8rXh64o
6WgW4SrsB6ICmr1kGQI73wcfgt5ecIu4TZf0OE9IHjn+2eRlsr jBdeORi7KiUNC/
pAG23I6MdDOFEQRcCSigCj+4/mciFUSASWS4dMbrpb9FNSIcf9dcLxVM7/6KxgJN
fZc9XWzUw77Jg8x92Zd0fVhHOux5IZC+UvSKWB4dyfcItE8C3p 9bbU9VGyY5vLCA
iIb4qQKBgQDLiO24GXrIkswF32YtBBMuVgLGCwU9h9HlO9mKAc 2m8Cm1jUE5IpzR
jTedc9I2qiIMUTwtgnw42auSCzbUeYMURPtDqyQ7p6AjMujp9E PemcSVOK9vXYL0
PtcoxW9MC0dtV6iPkCN7gOqiZXPRKaFbWADp16p8UAIvS/a5XXk5jwKBgQCKkpHi
2EISh1uRkhxljyWCiDCiK6JBRsMvpLbc0v5dKwP5alo1fmdR5P JaV2qvZSj5CYNp
MAy1/EDNTY5OSIJU+0KFmQbyhsbmrdLNLDL4+TcnT7c62/aH01ohYaf/VCbRhtLl
BfqGoQc7+sAc8vmKkesnF7CqCEKDyF/dhrxYdQKBgC0iZzzNAapayz1+JcVTwwEi
d6j9JqNXbBc+Z2YwMi+T0Fv/P/hwkX/ypeOXnIUcw0Ih/YtGBVACDQbsz7LcY1Hq
XiHKYNWNvXgwwO+oiChjxvEkSdsTTIfnK4VSCvU9BxDbQHjdiN DJbL6oar92UN7V
rBYvChJZF7LvUH4YmVpHAoGAbZ2X7XvoeEO+uZ58/BGKOIGHByHBDiXtzMhdJr15
HTYjxK7OgTZmgK+8zp4L9IbvLGDMJO8vft32XPEWuvI8twCzFH +CsWLQADZMZKSs
BasOZ/h1FwhdMgCMcY+Qlzd4JZKjTSu3i7vhvx6RzdSedXEMNTZWN4ql Ix3kR5aH
cukCgYA9T+Zrvm1F0seQPbLknn7EqhXIjBaTP8TTvW/6bdPi23ExzxZn7KOdrfcl
YRph1LHMpAONv/x2xALIf91UB+v5ohy1oDoasL0gij1houRe2ERKKdwz0ZL9SWq6
VTdhr/5G994CK72fy5WhyERbDjUIdHaK3M849JJuf8cSrvSb4g==
-----END RSA PRIVATE KEY-----
[ Now create a .pub file by extracting the public portion of the key file. SecureCRT will require both the private key and the public key ]
redhat [~/.ssh]-> ssh-keygen -e -f AmazonEC2Key >> AmazonEC2Key.pub
redhat [~/.ssh]-> cat AmazonEC2Key.pub
---- BEGIN SSH2 PUBLIC KEY ----
Comment: "2047-bit RSA, converted from OpenSSH by user@host"
AAAAB3NzaC1yc2EAAAADAQABAAABAG4sWDm6Meu2bWOe61K6g7 xd7nouVP4czy//GRprf0
Sy0zf9oXFMeASVCIksKGke6eBdDb1VNzytzVtbSWR2Lbc4fl6q QwcaG8TCprQdYBJQyWXi
jej8hf7R/ZRw+goI5VRH6PHvVKDkBTnYRB9qcifdlDyUVbsR2nlrergOGMa VQpOgdVuJwv
kT6DjnN8H3nAjLLBZl95b9RQXcukZnKr95shSWrWpNseQtsILa vtFOfy+lBanjsEZVga0Z
IEylNE/mGdvPO6qPeK2SIseNTf1LawkInROsnHmLwHKBHizeYcoGPyX54 9DEbWQZsXpHjK
DqwQKZefXsxFBVc4M0dls=
---- END SSH2 PUBLIC KEY ----
At this point, I was able to use the SFTP tab of SecureCRT to securely copy (as ASCII) the AmazonEC2Key* files to my local Windows machine and point my SecureCRT session to use them with publickey authentication.
sftp> pwd
/home/user
sftp> cd .ssh
sftp> pwd
/home/user/.ssh
sftp> ls A*
AmazonEC2Key AmazonEC2Key.pub
sftp> get -a AmazonEC2Key
Downloading AmazonEC2Key from /home/user/.ssh/AmazonEC2Key
100% 1KB 1KB/s 00:00:00
sftp> get -a AmazonEC2Key.pub
Downloading AmazonEC2Key.pub from /home/user/.ssh/AmazonEC2Key.pub
100% 515 bytes 515 bytes/s 00:00:00
sftp> lpwd
C:\temp
总结:使用openssh ssh-keygen将.pem转换为openssh格式的key。1、上传gsg-keypair.pem到一台linux服务器上2、cat gsg-keypair.pem>amazonec2key3、chmod 600 amazonec2key4、ssh-keygen -p -f amazonec2key5、ssh-keygen -e -f amazonec2key >> amazonec2key.pub6、使用amazonec2key做为secuCRT的key文件。