* Philippe Stellwag <[EMAIL PROTECTED]> wrote:
>
> That means, that padding didn't solve the problem of
> known-plaintext-, chosen-plaintext-, chosen-cyphertext- or
> adaptive-chosen-plaintext-attacks? What about OAEP padding?

Can I use the public key as secret key and backwards? Then I can
use OAEP for "signing" with the secret public key :-) and use the
public secret key in Linux-PAM for "verify the signature". The
advantage therefor is that I can use OAEP random(?) padding to get
of the _same_ plaintext different chiffertexts.

> In my point of view, if I use padding (e.g. PKCS#1 v1.5) every
> chiffertext of the _same_ plaintext looks _different_?!?!

Of course, only when using OAEP the chiffertext of the _same_
plaintext looks _different_!!!

Best regards,

Philippe


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to