[11439] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: adding noise blob to data before signing

daemon@ATHENA.MIT.EDU (Eric Rescorla)
Sat Aug 10 14:26:13 2002

To: Derek Atkins <derek@ihtfp.com>
Cc: Eugen Leitl <eugen@leitl.org>,
	Cryptography List <cryptography@wasabisystems.com>
Reply-To: EKR <ekr@rtfm.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: 10 Aug 2002 10:23:40 -0700
In-Reply-To: Derek Atkins's message of "10 Aug 2002 12:49:40 -0400"

Derek Atkins <derek@ihtfp.com> writes:
> Eugen Leitl <eugen@leitl.org> writes:
> 
> > 2) If I'm signing above short (~1 kBit) sequences, can I sign them 
> >    directly, or am I supposed to hash them first? (i.e. does a presence
> >    of an essentially fixed field weaken the signature)
> 
> It depends on the signature algorithm.  With RSA you can sign any
> message "directly" if said message is smaller than the public key size
> (N).  DSA, however, requires the use of a hash.
> 
> Note that, in the grand scheme of things, performing the public key
> operation is significantly slower than performing the hash, so it
> really doesn't hurt you computationally to perform the hash.  OTOH,
> your signature strength still depends on the strength of your hash.

It's generally a bad idea to sign RSA data directly. The RSA
primitive is actually quite fragile. At the very least you should
PKCS-1 pad the data.

-Ekr

-- 
[Eric Rescorla                                   ekr@rtfm.com]
                http://www.rtfm.com/

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post