On Sun, Feb 25, 2001 at 08:04:55PM -0500, Greg Stark wrote:
> It is not a bug, it is a known fact. As Joseph Ashwood notes, you end up
> trying to encrypt values that are larger than the modulus. The documentation
> and most literature do tend to refer to moduli as having a certain "length"
> in
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Reddie, Steven
Sent: Sunday, February 25, 2001 4:26 PM
To: [EMAIL PROTECTED]
Subject: RE: Maximum size of RSA message, was: Re: RSA Encrypt/Decrypt
fails
The message being encrypted/decrypted MUST be
At 15.02.01 18:19, you wrote:
>What's more, the attack I was refering to, as someone made me notice already,
>requires "e" messages, not 2, so it's more difficult to do if you use a
>large e,like 65535.
I´ve read this post as well.
Thanks for all the info, guys, the code is now working as inten
At 16.02.01 01:52, you wrote:
>I'm guessing that RSA_eay_private_encrypt uses padding
>type 1 since this function isn't intended for encrypting data, just signing
>it, because data that can be decrypted with a "public" key isn't really
>secure.
You´re right about that. The main goal is indeed pro
-Original Message-
> From: Jan Zoellner [SMTP:[EMAIL PROTECTED]]
> Sent: Friday, February 16, 2001 12:13 AM
> To: [EMAIL PROTECTED]
> Subject: Re: RSA Encrypt/Decrypt fails
>
> I reimplemented the whole thing to be padded with random data (which are
> discarded upon
Jan Zoellner wrote:
> At 15.02.01 13:04, you wrote:
> >point of using RSA if not ?, so I will insist once again on the fact that you
> >SHOULDN'T do that.
>
> I reimplemented the whole thing to be padded with random data (which are
> discarded upon decryption). PKCS#1 padding is worse than that,
ypted.
Joe
- Original Message -
From: "Jan Zoellner" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, February 14, 2001 2:25 PM
Subject: RSA Encrypt/Decrypt fails
> Hello,
>
> I have a problem for which I found no real solution in the manual or t
Hello,
I have a problem for which I found no real solution in the manual or the
list archives.
The basic idea is to encrypt data using RSA_private_encrypt and retrieve it
using RSA_public_decrypt. For RSA_private_encrypt, I set flen to RSA_size()
to encrypt just one block and decrypt it later.