Thx. I'll read these documents.

In my system the keys aren't generated in "instalation-time", but I
have both the keys, private and public pre-generated.

Actually in my system the password based encrypt system works fine,
and it's part of a larger subsystem. So the rsa idea has sounded good
for me :-)

Regards

2010/8/17 Wim Lewis <w...@omnigroup.com>:
>
> On Aug 17, 2010, at 3:19 PM, Wim Lewis wrote:
>> But for any real-world application, you'll want to do the standard business 
>> of generating a session key, encrypting the message using conventional 
>> symmetric encryption, and encrypting the session key with the public key. 
>> Since that's a lot of hassle and it's very easy to write something that 
>> works but isn't secure, it's probably a good idea to just adopt one of the 
>> higher level cryptographic containers such as CMS:
>>   http://www.openssl.org/docs/crypto/CMS_encrypt.html
>>
>> even though this does mean you start having to deal with all the X.509 crud.
>
> Ah, I forgot about http://www.openssl.org/docs/crypto/EVP_SealInit.html and 
> friends, maybe that would be an easier approach.
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to