> > Why not use the RSA key for this purpose, using an established
> > and tested
> > algorithm? Since you have the RSA key, and there are any number of
> > established algorithms to use an RSA key for encryption, why
> > did you roll
> > your own?
>
> This too is wrong,

If it's wrong, why did you say the same thing I did after claiming I was
wrong?

> one does not "use RSA" for this purpose, one uses an
> established protocol, CMS, S/MIME, PGP, ... when the file is encrypted by
> Alice for delivery to Bob, or a reputable symmetric PBE (password based
> encryption) when Alice is encrypting the file for later use by Alice and
> integrity protection is not required.

This is precisely the same thing I said, just in different words. Neither of
us suggested using RSA directly, and both of us suggested using an
established mechanism that uses the RSA key.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to