[12453] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: question about rsa encryption

daemon@ATHENA.MIT.EDU (Matt Crawford)
Tue Feb 4 16:00:38 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Tue, 04 Feb 2003 10:56:46 -0600
From: Matt Crawford <crawdad@fnal.gov>
In-reply-to: "03 Feb 2003 19:13:16 PST."
 <Pine.LNX.4.40.0302031906220.12359-100000@bolt.sonic.net>
To: bear <bear@sonic.net>
Cc: crypto mailing list <cryptography@wasabisystems.com>

> RSA is subject to blinding attacks and several other failure modes if
> used without padding.  For details on what that means, read the
> cyclopedia cryptologia article on RSA.
> 
> http://www.disappearing-inc.com/R/rsa.html

That brings on another amateur question. In that article it says,
"If the public exponent is less than a quarter of the modulus, RSA
can be insecure."

Well, the public exponents I've seen range from 17 to 65537. What
gives? Is this just one of the many weaknesses mitigated by proper
padding?


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post