> It sounds like you're saying that only RSA supports encrypting with a public
> key. But can't any asymmetric encryption algorithm encrypt using the public
> key? Why is RSA special in this regard?
Because that is the only thing we have implemented. The API's (and code to
call them) to do
There are (generally) 3 kinds of asymmetric cryptographic algorithms:
1. Signature algorithms, such as DSS, ECDSS, Ed255, and 3 modes of the
RSA algorithm.
2. Key exchange/generation algorithms such as DH, ECDH and SRP.
3. Key encryption algorithms, such as 2 other modes of the RSA algorithm.
Sorry, I'm still not quite getting it.
It sounds like you're saying that only RSA supports encrypting with a
public key. But can't any asymmetric encryption algorithm encrypt using
the public key? Why is RSA special in this regard?
Norm Green
On 8/15/2016 5:31 PM, Dr. Stephen Henson wrote:
On Mon, Aug 15, 2016, Norm Green wrote:
> Ok, thanks.
>
> What I don't understand is what key transport has to do with
> EV_SealInit() ? Why is key transport important here ?
>
Because EVP_SealInit() generates a random symmetric key and encrypts it using
one or more public keys. For this to wo
Ok, thanks.
What I don't understand is what key transport has to do with
EV_SealInit() ? Why is key transport important here ?
Norm Green
On 8/15/2016 2:38 PM, Dr. Stephen Henson wrote:
On Mon, Aug 15, 2016, Norm Green wrote:
The man page for EVP_SealInit says:
"The public key must be RS
On Mon, Aug 15, 2016, Norm Green wrote:
> The man page for EVP_SealInit says:
>
> "The public key must be RSA because it is the only OpenSSL public
> key algorithm that supports key transport."
>
> 1 ) Is this still true?
Yes: the only algorithm we currently support which handles key transport
The man page for EVP_SealInit says:
"The public key must be RSA because it is the only OpenSSL public key
algorithm that supports key transport."
1 ) Is this still true?
2) Will this restriction change now that RSA key transport is being
dropped from TLS 1.3 (or so I've read...)?
Norm Green