Dr. Stephen Henson wrote:
The [sic] look like the standard CRT components.
So:
a = iqmp
c = dmp1
f = dmq1
And, in fact, if you look at the PNG's in the posting,
"iqmp"Inverse of Q mod P a = Q^-1 mod P
"dmp1"D mod prime 1 c = Ks mod (P-1)
"dmp2"D mod prime 2
On Wed, Mar 10, 2004, mateus wrote:
> Hi Steve,
>
> I understand that I would not have to calculate this to use a
> private key, but the axalto cryptoflex
> smart card I'm using needs the RSA key in the following format to work:
>
>
> This format I've got in the "Programmer's Guide of Cryp
Hi Steve,
I understand that I would not have to calculate this to use a
private key, but the axalto cryptoflex
smart card I'm using needs the RSA key in the following format to work:
This format I've got in the "Programmer's Guide of Cryptoflex Cards".
The problem is that I don't know h
On Wed, Mar 10, 2004, mateus wrote:
> I'd have to ask you to pardon my ignorance too.
> In fact I do not know montogomery constants. I'm using cryptoflex smart
> cards
> and I'm having problems to find out what are a,c and f that it's
> Programmer's Guide references.
> I've found somewhere that
I'd have to ask you to pardon my ignorance too.
In fact I do not know montogomery constants. I'm using cryptoflex smart
cards
and I'm having problems to find out what are a,c and f that it's
Programmer's Guide references.
I've found somewhere that this would be some of montgomery constants,
but
Pardon my ignorance, but I don't know the "canonical" variable name
assignments, so "a, c, and f" mean nothing to me. I did a simple
google and found this paper which describes Montgomery's method,
including a version in MIPS 64 assembly language.
Perhaps this will help you get better oriented:
h