Keeping with ibm-main tradition, I'll steer this into a different ditch :-)


"Seriously, stop using RSA"
This is a very interesting writeup/presentation, I've shorted the URL for
obvious reasons
https://tinyurl.com/yxw5xvmv

IMO, ECDSA (NIST curves) are much better than RSA, although researchers
seem to prefer Curve25519 since the curve wasn't chosen by a government.

On Tue, Aug 27, 2019 at 7:56 AM Chad Rikansrud <
mainfr...@bigendiansmalls.com> wrote:

> " Non-repudiation for the message is not guaranteed by a hash. There is
> more than 1 message that could match that hash. "
>
> The breadth of privacy on the internet as we know it depends upon being
> able to trust that a hashing algo + cryptographic signature verifies the
> non-repudiation of the sender.
>
> Couple other items on this thread:
>
> it's true are an infinite number of inputs that would generate any given
> hash, and random inputs can and have created general hash collisions (md5
> for instance has known random input that creates identical hashes),
> however, creating a meaningful input that (say in this case would be
> similar to what someone would want to say & sign, but slightly different so
> as to alter the message) - is cryptographically infeasible with today's
> compute power / hashes.  Great article explaining collisions etc (
> https://www.sciencedirect.com/topics/computer-science/hash-collision)
>
> For RSA public key systems - there is only 1 private key for any given
> public key.  The keypairs certainly can and have been reused - that all
> depends on how good your entropy in choosing random numbers is (see
> https://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html
> )
>
> There's no requirement outside of p & q being prime (In RSA) , that the
> public exponent or its related private exponent need not be prime, only
> co-prime (having no factors in common) - as was mentioned earlier.  That
> said, one of the most common public exponent is prime (65537)
>
> All in all, to the original point though, sharing the private key by that
> vendor was terrible - you could effectively impersonate them in any / all
> situations that used that keypair/cert if you had a privileged position or
> means.   Yikes.
>
> Chad
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to