Dear Erwann ABALEA
Thank you for the reply. I was thinking that, if i ( A ) encrypt the
data with the public key from the certificate obtained from B, can the
intruder generate a private key using the public key from the same
certificate from B, which may lead to Man in Middle attack.
Please correct me if I am wrong .
Thanks and regards
Naveen
Erwann ABALEA wrote:
Hi,
Hodie XIV Kal. Iun. MMIX, naveen.bn scripsit:
I have a question ? can we have one public key and two private keys.
You can (set d' to d+k.n with an integer k), but all the private keys
will be equivalent. Everything you encrypt to the public key can be
decrypted with either private key, and when verifying a signature, you
won't be able to distinguish which private key was used to sign.
In fact, it's exactly the same as copying the private key file without
changing it.
What are you trying to achieve?