[14327] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A quick question...

daemon@ATHENA.MIT.EDU (Paul Walker)
Sun Sep 28 20:43:07 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 29 Sep 2003 00:08:35 +0100
From: Paul Walker <paul@black-sun.demon.co.uk>
To: Greg Rose <ggr@qualcomm.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <5.1.0.14.2.20030929082220.02581ea8@203.30.171.17>

On Mon, Sep 29, 2003 at 08:33:59AM +1000, Greg Rose wrote:

> common values. It also relies on using some rawly implemented RSA, so that
> all that is in the RSA payload is the hash, and nothing else. This
> violates all the standards that specify that the payload should be padded

The code which implements all of this has to run in <6KB of code space, so
it's entirely possible that they hacked together their own routines to deal
with it. Almost certain, in fact - I don't think there's a compiler
available, so any library would have to be rewritten in assembler anyway.

(Sorry I can't be more precise here, but I'm sure you can appreciate why.)

[snip explanation]
> Others may want to correct me or elaborate further, but I think that's 
> correct.

It certainly makes much more sense than the scrambled version I had before,
and fits with what cryptography I already knew. I still don't think it's a
particularly *practical* attack, but I could easily be wrong there, and it
only needs one. ;-)

Many thanks for your time!

Cheers,

-- 
Paul

                      "I'm not sure if this is a good or a bad thing.
                  Probably a bad thing;  most things are bad things."
                                                 -- Nile Evil Bastard

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post