> > Why not use the RSA key for this purpose, using an established > > and tested > > algorithm? Since you have the RSA key, and there are any number of > > established algorithms to use an RSA key for encryption, why > > did you roll > > your own? > > This too is wrong,
If it's wrong, why did you say the same thing I did after claiming I was wrong? > one does not "use RSA" for this purpose, one uses an > established protocol, CMS, S/MIME, PGP, ... when the file is encrypted by > Alice for delivery to Bob, or a reputable symmetric PBE (password based > encryption) when Alice is encrypting the file for later use by Alice and > integrity protection is not required. This is precisely the same thing I said, just in different words. Neither of us suggested using RSA directly, and both of us suggested using an established mechanism that uses the RSA key. DS ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org