On Fri, Oct 26, 2012 at 10:49 PM, Raj Mathur (राज माथुर) <[email protected]> wrote: > On Thursday 25 Oct 2012, Ivaylo Hubanov wrote: >> Yes Raj, >> You almost got the RSA encryption/decryption flow. :) Just the >> private key is used to sign the data and not to encrypt it. > > We're splitting hairs here :) but the private key is actually used to > encrypt. That encryption is called a signature. I hate to split hairs, but "encrypt with the private key" is not a valid cryptographic transform.
> Except, what you encrypt with the private key is a digest of the > message, not the whole message itself. When you sign, you treat the hash as an instance of cipher text and you perform the inverse transform - you are "decrypting with the private key" Jeff _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
