Hello *,

My problem:
I take an e-mail which was encrypted with
Mozilla 1.5 (using 2048 bit RSA key),
extract the session key,
and try to decrypt them using different
crypto providers with the following result:
The algorithm used to encrypt is detected as
1.2.840.113549.1.1.1.

Using Bouncy Castle:
Cipher keyCipher = Cipher.getInstance("1.2.840.113549.1.1.1", "BC");
// -> I get a BadPaddingException: Unknown Block Type

Using Cryptix:
Cipher keyCipher = Cipher.getInstance("RSA/ECB/PKCS#1","CryptixCrypto");
// -> I get a java.lang.ArrayIndexOutOfBoundsException:
too much data for RSA block

Using IAIK:
Cipher keyCipher = Cipher.getInstance("RSA/ECB/PKCS1Padding", "IAIK");
// -> I get a javax.crypto.BadPaddingException: Invalid PKCS#1
padding: encrypted message is not k OCTETS long!

So my question is:
Is there a workaround for this problem???
I really need to use RSA key sizes >= 1024 bit
(for key sizes of 768 and 512 bit this problem does not
appear.).

Any help appreciated!!! 

Regards,
Jens
_______________________________________________
mozilla-crypto mailing list
[EMAIL PROTECTED]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to