skar:

> Thanks for the advice. Hope this one is clear.
> Here are the concrete requirements:

> 1) Content should be encrypted only on the server.
> And public key must stay only on the server. No other
> person should have access to the public key.

That is not a requirement, that is an implementation. If you have to use
public-key cyrptography, it would only be because that is the only way to
meet your requirements.

> 2) Private key on the client machine should decrypt the
> file. It should have only the private key, not the
> public key. That way, no hostile user can create his own
> encrypted content and decrypt the file using the private key.

This is a completely nonsensical implementation. Whatever your requirements
are (which for some reason you refuse to state) this *can't* be a sensible
way to meet them.

> And it basically boils down to separating the public and private
> keys and finding a way to not have the public key inside the
> private key, which is the default in openssl.

Do you understand why the public key is so named? It doesn't seem so.

I don't think public key crypography is the right way to meet when I'm
guessing your requirements are. I strongly urge you to have a talk with
someone knowledgeable in cryptography and design a scheme with them.
Honestly, this conversation is not going well and is very, *very* unlikely
to result in you having a good idea of a way to meet your actual
requirements, whatever they are.

Sorry to be blunt, but getting a scheme that's actually secure is not easy.
You have to make sure your scheme isn't vulnerable to weaknesses of which
you are not aware, and if you refuse to do it the same way everyone else
does, that won't happen.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to