On Wed, 27 Feb 2002 [EMAIL PROTECTED] wrote:

> I have a quick question about encrypting with private key.

That's what we call a signature, and even if it is possible to encrypt
data with whichever key you want, it's definitely not a good idea to
*encrypt* with a *private* key, and *decrypt* with a *public* key...

> Now I'd like to know how difficult it would be to get the symmetric
> key without actually having the public key?

Since you call it a *public* key, then it is *public*, i.e. known.

> Should I generate or modify the RSA key in some specific way to
> make this more difficult?

If you really want to do that, then I think the best thing to do is to use
a big random number as the public exponent during the key generation.

But maybe a better answer could be to ask you to post your *real* problem,
instead of validating your solution, since you admitted you're not
familiar with crypto...

-- 
Erwann ABALEA <[EMAIL PROTECTED]> - RSA PGP Key ID: 0x2D0EABD5
-----
DM> J'arrive seulement sur ce groupe de discussion .Que faut il faire ?
Rien, il n'y a absolument rien d'autres à faire que taper son message en
répondant au groupe, ou pourquoi pas un nouveau message. Rien d'autres
-+- E in Guide du Neuneu Usenet - Mais oû ce qu'il est-il donc ? -+-

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to