[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Weak RSA keys?
I don't mean to flame you, but before you rush off and publish your
results somewhere you may want to step back and check over your premise
and the steps it involves a few times.
> The "spare" is 7. The "spare" runs faster, too. Go ahead, try it.
> The myth is that "ED = 1 mod (m)".
> The truth is as follows:
> G = gcd( p-1 , q-1) in this example G=2
> F = m/G in this example F=20
> ED = 1 mod (F)
Now how exactly do you calculate this "F"? Does it involve, say,
knowing phi(n), information ONLY available to you if you happen to
know the factorization of n? In which case the whole thing collapses
anyway?
How can you use this information to decrypt a message? If I were to
give you the 200 digit product of two primes, could you find the
"spare" key?
If I get some time I'd like to look over your method to see if it's
really there or an artifact of the numbers you chose. There is a
"weakness" easily shown in RSA in that for some keys, up to 9 messages
encrypt to themselves! That is, M^e = M mod n. Now, if you pick
large primes, these 9 messages will get lost in the 100 trillion
numbers every atom in the universe can have allocated, so it really
isn't a problem.
--
Karl L. Barrus: [email protected]
keyID: 5AD633 hash: D1 59 9D 48 72 E9 19 D5 3D F3 93 7E 81 B5 CC 32
"One man's mnemonic is another man's cryptography"
- my compilers prof discussing file naming in public directories