Re: RSA padding scheme

2012-01-26 Thread brian m. carlson
MFPA wrote: > On Monday 23 January 2012 at 12:47:03 AM, in > , brian m. carlson > wrote: > > This is not a problem with OpenPGP because the attacker > > never gets to see the value encrypted with RSA because > > it's the symmetric key. > > Isn't that the same thing as the session key, which can be

Re: RSA padding scheme

2012-01-25 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Monday 23 January 2012 at 12:47:03 AM, in , brian m. carlson wrote: > This is not a problem with OpenPGP because the attacker > never gets to see the value encrypted with RSA because > it's the symmetric key. Isn't that the same thing as t

Re: RSA padding scheme

2012-01-22 Thread Sergey Matveev
- User brian m. carlson on 2012-01-23 00:47:03 wrote: >> * sending ciphertext with the same "e" to several recipients >This depends on a small message. All secure padding schemes avoid this >problem because the pad the message so it is not small. >> * no randomness >All secure padding schemes

Re: RSA padding scheme

2012-01-22 Thread brian m. carlson
On Sun, Jan 22, 2012 at 11:29:54PM +0400, Sergey Matveev wrote: > >If the standard allowed different padding schemes, then all > >implementations would have to support multiple padding schemes, which > >would be burdensome without providing significantly more security. > Hmm, I see. However does it

Re: RSA padding scheme

2012-01-22 Thread Sergey Matveev
- User brian m. carlson on 2012-01-22 18:54:22 wrote: >GnuPG uses PKCS #1 v1.5. This is specified in RFC 4880. >You cannot choose a different padding scheme and remain in compliance >with the OpenPGP standard. Ah! I see. Thank you! Now I understand. >If the standard allowed different padding

Re: RSA padding scheme

2012-01-22 Thread brian m. carlson
On Sun, Jan 22, 2012 at 07:48:28PM +0400, Sergey Matveev wrote: > As I understand, such asymmetric ciphers as RSA and/or ElGamal requires > strong padding applied before "message" is encrypted. Message is of > course the one-time session key, used to encipher the actual data. To use them correctly

RSA padding scheme

2012-01-22 Thread Sergey Matveev
Greetings everyone! As I understand, such asymmetric ciphers as RSA and/or ElGamal requires strong padding applied before "message" is encrypted. Message is of course the one-time session key, used to encipher the actual data. There are different versions of PKCS#1, NESSIE, OAEP and other schemes