I don't think you're wrong there Alok. The E(KDE)PUBK is
A random Des key taken as _data_ and encrypted asymmetrically
With the recipient's public key. Only the recipient will be
Able to decrypt it, with her private key.

Philip Painter
Hewlett-Packard Company
07747456508
http://ecardfile.com/id/PhilipPainter


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Alok
Sent: 23 September 2004 16:25
To: [EMAIL PROTECTED]
Subject: Re: signedandenveoped + encryption from commandline


>
>
>Not at all, there's no man in the middle issue at all because the 
>certificates which are issued by a trusted TP g'tee the ownership of 
>the public key.
>
>The logic goes like this:
>
>You generate a random DES key known only to you. Let's call this KDE
>
>You use this to encrypt the data.   Lets call this E(Data)KDE.
>
>You encrypt KDE under the recipients Public Key which you know to be 
>his because it is certified by a CA.  Let's call this E(KDE)PUBK. You 
>send E(Data)KDE and E(KDE)PUBK to the recipient.
>
...over a secure channel?

if not E(KDE)PUBK is nothing but DES using key=pubk and data = kde are
you saying DES is a 1 way hash function? AFAIK it is not, so if u 
know pubk, u can get kde too.


>
>The only person who can decrypt KDE is the recipient as the are the 
>only person who has the private key that goes with their public key.  
>The recipient decrypts E(KDE)PUBK, using their private key, thus 
>retrieving KDE, this can in turn be used to decrypt E(Data)KDE.
>
>No possibility of a MIM attack because you get the recipients PUBK from

>a certificate digitally signed by the CA's private key, and the 
>validity of this can be checked using the CA's certificate.
>
>Now of course if we didn't have certificates, then this all falls 
>apart.
>
>Get yourself a copy of Bruce Schneier's "Applied Cryptography" (ISBN
>0-471-11709-9) and read it.
>
good idea :)

-thanks!




______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to