| Hi.
|
| If an attacker is given access to a raw RSA decryption oracle (the
| oracle calculates c^d mod n for any c) is it possible to extract the
| key (d)?
If I hand you my public key, I have in effect handed you an oracle that
will compute c^d mod n for any c. What you are asking is whether
Jon Callas wrote:
[... about DKIM ...] The signature travels with the message and
the signing key is in the network. As long as you have both, you can
verify the signatures.
the signing key is in the network -- Indeed. The public signature key
is stored in the DNS.
DKIM might be
On Thu, 7 Sep 2006, Leichter, Jerry wrote:
| If an attacker is given access to a raw RSA decryption oracle (the
| oracle calculates c^d mod n for any c) is it possible to extract the
| key (d)?
If I hand you my public key, I have in effect handed you an oracle that
will compute c^d mod n for
The conventional wisdom is that the successful US cryptanalytic efforts
against Japanese naval codes was a closely-held secret.
Has the conventional wisdom forgotten that it was reported in the
Chicago Tribune in 1942?
See, for example, http://www.newseum.org/warstories/essay/secrecy.htm
On 7 Sep 2006 15:33:15 -, John Levine [EMAIL PROTECTED] wrote:
The conventional wisdom is that the successful US cryptanalytic efforts
against Japanese naval codes was a closely-held secret.
Has the conventional wisdom forgotten that it was reported in the
Chicago Tribune in 1942?
Check
http://www.matasano.com/log/178/recover-a-private-key-from-process-memory/
or if you want to find the algorithms
http://www.hexblog.com/2006/01/findcrypt.html
On Mon, 4 Sep 2006, Douglas F. Calvert wrote:
Hello,
I remember seeing a paper about identifying private keys in RAM. I
--
Paul Hoffman wrote:
At 11:40 AM +0200 9/5/06, Massimiliano Pala wrote:
Jon Callas wrote:
On 4 Sep 2006, at 4:13 AM, Travis H. wrote:
Has anyone created hooks in MTAs so that they
automagically [sign email]
[...]
Go look at http://www.dkim.org/ for many more
details.
This
Alexander Klimov asks:
If an attacker is given access to a raw RSA decryption oracle (the
oracle calculates c^d mod n for any c) is it possible to extract the
key (d)?
This is equivalent to asking whether factoring reduces to RSA inversion.
That is, given access to an RSA inversion oracle, can
Dear list,
Has anybody heard about Kryptor? Any opinions?
(Link: http://www.rosiello.org/modules/smartsection/visit.php?fileid=1)
Regards,
Leandro Meiners.-
--
Leandro Federico Meiners
-
The Cryptography Mailing List
Hey,
Does anyone know of any OSS OS facilities for managing keys?
With ssh-agent and gpg-agent providing access to key storage
by inherited processes, and the keys themselves being vulnerable
as stored on-disk, I wonder if there isn't any more general facility
for doing key management and
Found at doxpara.com:
fingerprints: http://chris.fornax.net/biometrics.html
faceprints:
http://www.site.uottawa.ca/~adler/publications/2003/adler-2003-fr-templates.pdf
More on fingerprints:
http://onin.com/fp/cyanoho.html
At home I have an excellent page on making fake fingerprints, but I
LONDON (Reuters) - A code-cracking machine that enabled Britain to
read Nazi military ciphers during World War Two has been rebuilt by
enthusiasts after a 10-year project.
http://news.scotsman.com/latest.cfm?id=1318542006format=print
--
Perry E. Metzger[EMAIL PROTECTED]
| | If an attacker is given access to a raw RSA decryption oracle (the
| | oracle calculates c^d mod n for any c) is it possible to extract the
| | key (d)?
| If I hand you my public key, I have in effect handed you an oracle that
| will compute c^d mod n for any c. What you are asking is
Hi,
I recently tested an RSA SecurID SID800 Token
http://www.rsasecurity.com/products/securid/datasheets/SID800_DS_0205.pdf
The token is bundled with some windows software designed to make
user's life easier. Interestingly, this software provides a function
which directly copies the current
14 matches
Mail list logo