Dr. Stephen Henson wrote:

The [sic] look like the standard CRT components.

So:

a = iqmp
c = dmp1
f = dmq1

And, in fact, if you look at the PNG's in the posting,


"iqmp"    Inverse of Q mod P     a  =  Q^-1 mod P
"dmp1"    D mod prime 1          c  =  Ks mod (P-1)
"dmp2"    D mod prime 2          f  =  Ks mod (Q-1)

so it all makes sense, given that P and Q (which are the
secret factors of M) are "prime1" and "prime2".

I've got a staff meeting in 10 minutes, so I don't have
time to really work this out, but given private key format

http://ospkibook.sourceforge.net/docs/OSPKI-2.4.6/OSPKI/sample-key-components.htm

you might be able to find a correspondance between the
above and

exponent1
exponent2
coefficient

failing that, I guess you'd have to compute a, c, f...

--
Charles B (Ben) Cranston
mailto: [EMAIL PROTECTED]
http://www.wam.umd.edu/~zben

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to