RE: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-19 Thread Peter Walker
g the stuff anyway ;) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ger Hobbelt Sent: 18 September 2008 10:21 To: openssl-users@openssl.org Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption :-) Well, the 'funny&#x

Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-19 Thread Ger Hobbelt
; So as a noob, I just wanted to know if that is the correct requirement > of RSA or a requirement of my parent companies web service only? > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Michael Sierchio > Sent: 17 September 2008 22:48

RE: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-18 Thread Peter Walker
19:25 To: openssl-users@openssl.org Subject: RE: Do you have to pre-pend 16 bytes to a raw value before RSA encryption Peter Walker wrote: > Sorry if this sounds ultra noobish but you guys lost me, even though you > probably did answer my question ;) > > The purpose of my application

RE: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-18 Thread David Schwartz
Peter Walker wrote: > Sorry if this sounds ultra noobish but you guys lost me, even though you > probably did answer my question ;) > > The purpose of my application is to send a credit card number in > encrypted format. > > So the parent companies webservice issues me a X509 certificate which >

Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-18 Thread Goetz Babin-Ebell
| Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA | encryption | | Peter Walker wrote: | |> The purpose of my application is to send a credit card number in |> encrypted format. | | Then use OAEP. For that the upstream server must also use OAEP. Since it obviously d

RE: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-18 Thread Peter Walker
But the peer uses RSA_PKCS1_PADDING. Is this interchangeable with OAEP? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michael Sierchio Sent: 18 September 2008 10:02 To: openssl-users@openssl.org Subject: Re: Do you have to pre-pend 16 bytes to a raw

Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-18 Thread Michael Sierchio
Peter Walker wrote: > The purpose of my application is to send a credit card number in > encrypted format. Then use OAEP. - M __ OpenSSL Project http://www.openssl.org User Support Mailing List

RE: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-18 Thread Peter Walker
@openssl.org Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption Kenneth Goldman wrote: > What padding are you specifying? I suspect that you are specifying > no padding, in which case the size of the input must be the same > as the size of the key. No. The

Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-17 Thread Michael Sierchio
Kenneth Goldman wrote: > What padding are you specifying? I suspect that you are specifying > no padding, in which case the size of the input must be the same > as the size of the key. No. The input is the same size as the *modulus*. When used in encryption the recommended approach for RSA is

RE: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-17 Thread Peter Walker
Goldman Sent: 17 September 2008 15:47 To: openssl-users@openssl.org Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption [EMAIL PROTECTED] wrote on 09/17/2008 08:10:09 AM: > I just completed writing my first program using libcrypto to handle > RSA encryption

Re: Do you have to pre-pend 16 bytes to a raw value before RSA encryption

2008-09-17 Thread Kenneth Goldman
[EMAIL PROTECTED] wrote on 09/17/2008 08:10:09 AM: > I just completed writing my first program using libcrypto to handle > RSA encryption sing a public key extracted from a X509 certificate. > This program communicates with a service created by our parent company. > > The first attempts that I mad