* Philippe Stellwag <[EMAIL PROTECTED]> wrote: > > That means, that padding didn't solve the problem of > known-plaintext-, chosen-plaintext-, chosen-cyphertext- or > adaptive-chosen-plaintext-attacks? What about OAEP padding?
Can I use the public key as secret key and backwards? Then I can use OAEP for "signing" with the secret public key :-) and use the public secret key in Linux-PAM for "verify the signature". The advantage therefor is that I can use OAEP random(?) padding to get of the _same_ plaintext different chiffertexts. > In my point of view, if I use padding (e.g. PKCS#1 v1.5) every > chiffertext of the _same_ plaintext looks _different_?!?! Of course, only when using OAEP the chiffertext of the _same_ plaintext looks _different_!!! Best regards, Philippe ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]