Can anyone outline how to choose the value of the
public exponent when generating RSA key pairs?
There are "n" number of users that own RSA
public/private key pairs. The same secret data is
given to these users by encrypting it with their
public keys.
There are known attacks against RSA when the public
exponent is the fixed for all the key generations,
such as by default, the crypto++ RSA public exponent
is 17.
How does one deal with this situation? Do you choose
a pseudorandom number for the public exponent when
generating key pairs?
or, does it make more sense to salt the secret data
that must be shared before encrypting it with the RSA
public keys?
-brian
__________________________________
Do you Yahoo!?
Yahoo! Tax Center - File online by April 15th
http://taxes.yahoo.com/filing.html