Hello Scott,
At 03/02/03 21:50, Scott G. Kelly wrote:
I have a question regarding RSA encryption - forgive me if this seems
amateur-ish -, but 'm still a beginner. I seem to recall reading
somewhere that there is some issue with directly encrypting data with an
RSA public key, perhaps some
On Mon, 3 Feb 2003, Scott G. Kelly wrote:
I have a question regarding RSA encryption - forgive me if this seems
amateur-ish -, but 'm still a beginner. I seem to recall reading
somewhere that there is some issue with directly encrypting data with an
RSA public key, perhaps some vulnerability,
Scott G. Kelly wrote:
I seem to recall reading somewhere that there is some issue with
directly encrypting data with an RSA public key, perhaps some
vulnerability, but I can't find any reference after a cursory look.
There are a few different ones, some simple and some complex. First of
all,
Von: Scott G. Kelly [mailto:[EMAIL PROTECTED]]
Does anyone know of any issue
with using
RSA encryption to encrypt a symmetric key under the target's
public key
if the encrypted value is public (e.g. sent over a network)?
You have to be very careful in designing and implementing your
On Tue, 4 Feb 2003, Sidney Markowitz wrote:
The short answer is that you should use one of the standard padding modes
that are designed for RSA encryption, usually OAEPPadding. There are
subtleties that the paddings are designed to take into to account, and if
you use the padding you don't
Ralf Senderek [EMAIL PROTECTED] asked:
And if one loves to learn about every single one of them,
can you (or others) give some references ?
The page titled Prescriptions for Applications that are Vulnerable to the
Adaptive Chosen Ciphertext Attack on PKCS #1 v1.5 at URL
Matt Crawford [EMAIL PROTECTED] writes:
RSA is subject to blinding attacks and several other failure modes if
used without padding. For details on what that means, read the
cyclopedia cryptologia article on RSA.
http://www.disappearing-inc.com/R/rsa.html
That brings on another
RSA is subject to blinding attacks and several other failure modes if
used without padding. For details on what that means, read the
cyclopedia cryptologia article on RSA.
http://www.disappearing-inc.com/R/rsa.html
That brings on another amateur question. In that article it says,
I have a question regarding RSA encryption - forgive me if this seems
amateur-ish -, but 'm still a beginner. I seem to recall reading
somewhere that there is some issue with directly encrypting data with an
RSA public key, perhaps some vulnerability, but I can't find any
reference after a cursory
In message [EMAIL PROTECTED], Scott G. Kelly writes:
I have a question regarding RSA encryption - forgive me if this seems
amateur-ish -, but 'm still a beginner. I seem to recall reading
somewhere that there is some issue with directly encrypting data with an
RSA public key, perhaps some
Scott G. Kelly [EMAIL PROTECTED] wrote:
I seem to recall reading somewhere that there is some issue
with directly encrypting data with an
RSA public key, perhaps some vulnerability
The short answer is that you should use one of the standard padding modes
that are designed for RSA encryption,
11 matches
Mail list logo