" Non-repudiation for the message is not guaranteed by a hash. There is more 
than 1 message that could match that hash. "

The breadth of privacy on the internet as we know it depends upon being able to 
trust that a hashing algo + cryptographic signature verifies the 
non-repudiation of the sender.

Couple other items on this thread:

it's true are an infinite number of inputs that would generate any given hash, 
and random inputs can and have created general hash collisions (md5 for 
instance has known random input that creates identical hashes), however, 
creating a meaningful input that (say in this case would be similar to what 
someone would want to say & sign, but slightly different so as to alter the 
message) - is cryptographically infeasible with today's compute power / hashes. 
 Great article explaining collisions etc 
(https://www.sciencedirect.com/topics/computer-science/hash-collision)

For RSA public key systems - there is only 1 private key for any given public 
key.  The keypairs certainly can and have been reused - that all depends on how 
good your entropy in choosing random numbers is (see 
https://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html)

There's no requirement outside of p & q being prime (In RSA) , that the public 
exponent or its related private exponent need not be prime, only co-prime 
(having no factors in common) - as was mentioned earlier.  That said, one of 
the most common public exponent is prime (65537)

All in all, to the original point though, sharing the private key by that 
vendor was terrible - you could effectively impersonate them in any / all 
situations that used that keypair/cert if you had a privileged position or 
means.   Yikes.

Chad

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to