Alright, big thanks to both of you for your input!
On Mar 15, 2017 23:01, "Wouter Verhelst" wrote:
On 15-03-17 05:13, valéry wrote:
> Hi,
>
> thank you very much for your response.
> Say someone would be able to gather several clear text AES keys and
> their respective asymmetrically encrypted
On 15-03-17 05:13, valéry wrote:
Hi,
thank you very much for your response.
Say someone would be able to gather several clear text AES keys and
their respective asymmetrically encrypted RSA blocks. Would it weakens
the security of the RSA key pair ? I mean could it be easier for someone
using th
> Say someone would be able to gather several clear text AES keys and their
> respective asymmetrically encrypted RSA blocks. Would it weakens the security
> of the RSA key pair ? I mean could it be easier for someone using that
> information to brute force an RSA key pair ?
No
--
openssl-user
Hi,
thank you very much for your response.
Say someone would be able to gather several clear text AES keys and their
respective asymmetrically encrypted RSA blocks. Would it weakens the
security of the RSA key pair ? I mean could it be easier for someone using
that information to brute force an RS
> If so, would it be possible in principle to decrypt an encrypted PKCS#7
> envelope only knowing which AES key was used ?
Yes. But maybe not with the openssl api's :)
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Hi,
is the following picture correct ?
when creating an encrypted PKCS#7 envelope, a random AES key is generated
and encrypted with the provided RSA private key. The AES key is used to
encrypt the envelope content. The X509 certificate containing the
associated public key is included in the envelo