" Non-repudiation for the message is not guaranteed by a hash. There is more than 1 message that could match that hash. "
The breadth of privacy on the internet as we know it depends upon being able to trust that a hashing algo + cryptographic signature verifies the non-repudiation of the sender. Couple other items on this thread: it's true are an infinite number of inputs that would generate any given hash, and random inputs can and have created general hash collisions (md5 for instance has known random input that creates identical hashes), however, creating a meaningful input that (say in this case would be similar to what someone would want to say & sign, but slightly different so as to alter the message) - is cryptographically infeasible with today's compute power / hashes. Great article explaining collisions etc (https://www.sciencedirect.com/topics/computer-science/hash-collision) For RSA public key systems - there is only 1 private key for any given public key. The keypairs certainly can and have been reused - that all depends on how good your entropy in choosing random numbers is (see https://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html) There's no requirement outside of p & q being prime (In RSA) , that the public exponent or its related private exponent need not be prime, only co-prime (having no factors in common) - as was mentioned earlier. That said, one of the most common public exponent is prime (65537) All in all, to the original point though, sharing the private key by that vendor was terrible - you could effectively impersonate them in any / all situations that used that keypair/cert if you had a privileged position or means. Yikes. Chad ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN