Dear Erwann ABALEA
Thank you for the reply. I was thinking that, if i ( A ) encrypt the data with the public key from the certificate obtained from B, can the intruder generate a private key using the public key from the same certificate from B, which may lead to Man in Middle attack.
Please correct me if I am wrong .

Thanks and regards
Naveen

Erwann ABALEA wrote:
Hi,

Hodie XIV Kal. Iun. MMIX, naveen.bn scripsit:
I have a question ? can we have one public key and two private keys.

You can (set d' to d+k.n with an integer k), but all the private keys
will be equivalent. Everything you encrypt to the public key can be
decrypted with either private key, and when verifying a signature, you
won't be able to distinguish which private key was used to sign.

In fact, it's exactly the same as copying the private key file without
changing it.

What are you trying to achieve?

Reply via email to