[12325] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Key Pair Agreement?

daemon@ATHENA.MIT.EDU (Matt Crawford)
Tue Jan 21 11:53:08 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Tue, 21 Jan 2003 10:41:32 -0600
From: Matt Crawford <crawdad@fnal.gov>
In-reply-to: "20 Jan 2003 21:08:31 EST."
 <200301210208.h0L28Mj02804@sydney.East.Sun.COM>
To: radia.perlman@sun.com
Cc: cryptography@wasabisystems.com

>  I can see how Alice can easily generate two primes whose product
> will have that *high* order part, but it seems hard to generate an
> RSA modulus with a specific *low* order 64 bits.

Is it?  As long as the lowest bit is a 1, Alice just has to search
for one prime that ends with 63 0's and a 1 (she may keep one up her
sleeve) and the other prime ending with the specified bits.  As long
as the length of each prime is much greater than 64 bits, I don't see
that this slows her down too badly.

Isn't this the reason why using the bottom 32 bits of a PGP RSA key
for a key id is subject to a user-confusion attack?

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post