On Wed, 27 Feb 2002 [EMAIL PROTECTED] wrote: > I have a quick question about encrypting with private key.
That's what we call a signature, and even if it is possible to encrypt data with whichever key you want, it's definitely not a good idea to *encrypt* with a *private* key, and *decrypt* with a *public* key... > Now I'd like to know how difficult it would be to get the symmetric > key without actually having the public key? Since you call it a *public* key, then it is *public*, i.e. known. > Should I generate or modify the RSA key in some specific way to > make this more difficult? If you really want to do that, then I think the best thing to do is to use a big random number as the public exponent during the key generation. But maybe a better answer could be to ask you to post your *real* problem, instead of validating your solution, since you admitted you're not familiar with crypto... -- Erwann ABALEA <[EMAIL PROTECTED]> - RSA PGP Key ID: 0x2D0EABD5 ----- DM> J'arrive seulement sur ce groupe de discussion .Que faut il faire ? Rien, il n'y a absolument rien d'autres à faire que taper son message en répondant au groupe, ou pourquoi pas un nouveau message. Rien d'autres -+- E in Guide du Neuneu Usenet - Mais oû ce qu'il est-il donc ? -+- ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]