On Thu, Feb 23, 2006, Chris wrote:

> On 2/23/06, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote:
> >
> > There are security issues associated with RSA private key operations which
> > are
> > handled by OpenSSL trying the reverse operation using a public key which
> > requires the public exponent.
> >
> > While this is particularly the case when all CRT components are present
> > there
> > are some lesser ones when just the private exponent is used.
> >
> > In any case it is a good idea to use or recalculate the CRT components
> > because
> > RSA is much quicker when they are present.
> 
> 
> Thanks.  I knew the blinding was in there but I was not sure how it was
> implemented.
> 

Actually cwitthat isn't blinding I was referring to. It is protection against a
well known attack where if an RSA private key operation calculation fails and
the invalid data is visible (for example an invalid signature) the private key
can be leaked. For CRT a single error is sufficient.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to