Re: Cryptology Questions

2001-12-07 Thread Michael Sierchio
Eric Rescorla wrote: > The attack you describe: creating a document with a SPECIFIC digest, > is 2^n hard ... Eric is of course correct. __ OpenSSL Project http://www.openssl.org User Support Mail

RE: Cryptology Questions

2001-12-07 Thread Bernard Dautrevaux
> -Original Message- > From: Eric Rescorla [mailto:[EMAIL PROTECTED]] > Sent: Friday, December 07, 2001 5:29 PM > To: [EMAIL PROTECTED] > Subject: Re: Cryptology Questions > > > Bernard Dautrevaux <[EMAIL PROTECTED]> writes: > > It's even worst t

Re: Cryptology Questions

2001-12-07 Thread Eric Rescorla
Bernard Dautrevaux <[EMAIL PROTECTED]> writes: > It's even worst than that: Alice can agree with Bob to the original > contract, and have Bob sign it. THEN she have: >- The contract itself (which can be used to generate the MD5 digest) >- Bob's signed MD5 digest > > Then applying the birt

RE: Cryptology Questions

2001-12-07 Thread Bernard Dautrevaux
> -Original Message- > From: Michael Wojcik [mailto:[EMAIL PROTECTED]] > Sent: Thursday, December 06, 2001 10:46 PM > To: [EMAIL PROTECTED] > Subject: RE: Cryptology Questions > > > > From: Neff Robert A [mailto:[EMAIL PROTECTED]] > > Sent: Th

RE: Cryptology Questions

2001-12-07 Thread Neff Robert A
ROHRER, KEITH W (AIT) [mailto:[EMAIL PROTECTED]] Sent: Thursday, December 06, 2001 5:53 PM To: '[EMAIL PROTECTED]' Subject: RE: Cryptology Questions Regarding key distribution, no one but the owner should have access to the private key. What reason would the server have for sending a c

RE: Cryptology Questions

2001-12-06 Thread Neff Robert A
Title: RE: Cryptology Questions Yes, the digest is used to validate that the data wasn't altered.  Remember that anyone can calculate the digest of a message.  If the digest wasn't encrypted with your private key, then someone could change the data, recompute the digest, and ex

Re: Cryptology Questions

2001-12-06 Thread Eric Rescorla
Andrew Finnell <[EMAIL PROTECTED]> writes: > I was wondering if someone could help me out. I have to speak with > some cryptology experts later today and was wondering if some answers could > be answered. > > 1. What is the normal/(most secure) way to store private keys and > protect

Re: Cryptology Questions

2001-12-06 Thread Eric Rescorla
Erwann ABALEA <[EMAIL PROTECTED]> writes: > On Thu, 6 Dec 2001, Andrew Finnell wrote: > > > digest. I did not know it was a checksum to validate that the data wasn't > > altered. > > It's more robust than the usual "checksums" (CRC). You can easily fool a > CRC32, but fooling a cryptographic di

RE: Cryptology Questions

2001-12-06 Thread Erwann ABALEA
On Thu, 6 Dec 2001, Andrew Finnell wrote: > digest. I did not know it was a checksum to validate that the data wasn't > altered. It's more robust than the usual "checksums" (CRC). You can easily fool a CRC32, but fooling a cryptographic digest is another matter... In fact, for MD5 and SHA1, nobo

RE: Cryptology Questions

2001-12-06 Thread Andrew Finnell
Title: RE: Cryptology Questions Neff,         Thanks for the quick response. You actually helped me understand some aspects that I didnt truely understand before. For example the message digest. I did not know it was a checksum to validate that the data wasn't altered. --- More ques

RE: Cryptology Questions

2001-12-06 Thread Neff Robert A
Title: Cryptology Questions hmmm...a tall order for us busy folks...but I'll help you out some.   1. Provided you are using a "strong" password to encrypt your key when using DES-CBC you are pretty secure.  Remember that if I can get access to, or copy, your .pem file from off your machine