On Wed, 9 Jun 1999, Holger Reif wrote:

> ÃÖ¿ë»ï schrieb:
> > 
> > With reference to rsa.h,
> > I found that there are four kinds of padding.
> > Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING.
> > 
> > Basic assumption here is,
> > 1. RSA Key size : 256
> 
> Just remember, this counts for 32 byte...
> 
> > 2. size of message to be encrypted : 33
> 
> ...which would make it impossible to encrypt more then 32 byte
> within one rsa operation.

Not exactly..... You can encrypt any block size with any key size.... even
a 12KB block with a 16bit key.... Mathematically, there's no
limitation....

But if you use a block bigger than the key size, you won't be able to
decrypt and retrieve the original message....

In fact, the data you want to encrypt, when expressed as a bigint, MUST be
at most equal to the modulus-1 if you want to decrypt the data...

-- 
Erwann ABALEA
System and Development Engineer - Certplus SA
[EMAIL PROTECTED]
- RSA PGP Key ID: 0x2D0EABD5 -

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to