[12462] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: question about rsa encryption

daemon@ATHENA.MIT.EDU (Anton Stiglic)
Wed Feb 5 10:59:32 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
From: "Anton Stiglic" <astiglic@okiok.com>
To: "Whyte, William" <WWhyte@ntru.com>,
	"Matt Crawford" <crawdad@fnal.gov>, "bear" <bear@sonic.net>
Cc: "crypto mailing list" <cryptography@wasabisystems.com>
Date: Wed, 5 Feb 2003 10:03:01 -0500

> > That brings on another amateur question. In that article it says,
> > "If the public exponent is less than a quarter of the modulus, RSA
> > can be insecure."
> >
> > Well, the public exponents I've seen range from 17 to 65537. What
> > gives? Is this just one of the many weaknesses mitigated by proper
> > padding?
>
> This should probably refer to the private exponent.

No, it also applies to the public exponent if the messages you encrypt are
related in a simple way (something like OAEP will make them *not* related
in that simple way and prevent the attack).  Funny thing is that the attack
is
described in the paper by Boneh that *you* cited, which I also mentioned
in my last post...

There are also attacks on low private exponents, but that`s something else
(good randomized padding doesn't prevent that)...

--Anton


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post