On Wed, 9 Jun 1999, Holger Reif wrote:
> ÃÖ¿ë»ï schrieb:
> >
> > With reference to rsa.h,
> > I found that there are four kinds of padding.
> > Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING.
> >
> > Basic assumption here is,
> > 1. RSA Key size : 256
>
> Just remember, this counts for 32 byte...
>
> > 2. size of message to be encrypted : 33
>
> ...which would make it impossible to encrypt more then 32 byte
> within one rsa operation.
Not exactly..... You can encrypt any block size with any key size.... even
a 12KB block with a 16bit key.... Mathematically, there's no
limitation....
But if you use a block bigger than the key size, you won't be able to
decrypt and retrieve the original message....
In fact, the data you want to encrypt, when expressed as a bigint, MUST be
at most equal to the modulus-1 if you want to decrypt the data...
--
Erwann ABALEA
System and Development Engineer - Certplus SA
[EMAIL PROTECTED]
- RSA PGP Key ID: 0x2D0EABD5 -
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]