On 2/23/06, Dr. Stephen Henson <[EMAIL PROTECTED]
> wrote:
Thanks. I knew the blinding was in there but I was not sure how it was implemented.
In
my tests I found using the CRT components speed it up
about 3x. With my application being a desktop app, full blown RSA
operations are relatively few and far between so the simplicity of
managing just the private exponent is a worthwhile trade-off.
Considering even a lowly 266 Mhz laptop can still do more than twelve
1024-bit operations per second, that is plenty fast.
There are security issues associated with RSA private key operations which are
handled by OpenSSL trying the reverse operation using a public key which
requires the public exponent.
While this is particularly the case when all CRT components are present there
are some lesser ones when just the private exponent is used.
In any case it is a good idea to use or recalculate the CRT components because
RSA is much quicker when they are present.
Thanks. I knew the blinding was in there but I was not sure how it was implemented.
Thanks again.