Ok. I am a little bit confused. You are telling me that a same data encrypted
with the same key can generate different results? How can the decryption
process can succeed ?!

Maybe it's my cryto knowledge that are limited, but I was sure that one
output correspond to one input.

I run my tests couples of time and it always gives me the same output result
each times (meaning that the peuso-random generator always gives the same
number?).

You are probably right, but could you confirm me that my tests are made
correctly (using a longer array than the size passed to the encryption
function) ? 






Dr. Stephen Henson wrote:
> 
> On Mon, Dec 15, 2008, BiGNoRm6969 wrote:
> 
>> 
>> Hi, the OpenSSL documentation tells : 
>> 
>> "RSA_public_encrypt() encrypts the flen bytes at from (usually a session
>> key) using the public key rsa and stores the ciphertext in to. to must
>> point
>> to RSA_size(rsa) bytes of memory. "
>> 
>> 
>> I made a test and I saw something strange. I used theses arrays for my
>> tests:
>> 
>> unsigned char* test1 = new unsigned char[5];
>> test1[0] = 'a';
>> test1[1] = 'b';
>> test1[2] = 'c';
>> test1[3] = 'd';
>> test1[4] = 'e';
>> 
>> unsigned char* test2 = new unsigned char[4];
>> test2[0] = 'a';
>> test2[1] = 'b';
>> test2[2] = 'c';
>> test2[3] = 'd';
>> 
>> 
>> Here is my test:
>> 
>> RSA_public_encrypt(4, test1, encryptedLine1, publicKey,
>> RSA_PKCS1_PADDING);
>> RSA_public_encrypt(4, test2, encryptedLine2, publicKey,
>> RSA_PKCS1_PADDING);
>> 
>> The two results (stored in encryptedLineX...) are not the same and I
>> don't
>> understand why.  The first argument is not supposed to be the length (in
>> bytes)  of the data to be encrypted ? So in the two cases, the encryption
>> is
>> not supposed to bo on caracter 1 to 4 !?
>> 
> 
> This is expected behaviour and is due to the nature of that padding mode.
> It
> includes some pseudo random data which is different on each invocation. So
> even if you encrypt the same data using the same key you will get a
> different
> output each time.
> 
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> OpenSSL project core developer and freelance consultant.
> Homepage: http://www.drh-consultancy.demon.co.uk
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
> 
> 

-- 
View this message in context: 
http://www.nabble.com/RSA_public_encrypt%28%29-strange-result-output...-is-it-a-bug-%21--tp21022467p21032487.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to