* Dr. Stephen Henson wrote on Wed, Sep 02, 2009 at 15:08 +0200:
> Including a public key certificate in no way risks the
> integrity of its private key as several others have said in
> this thread.

I think this theoretically opens the possibility to brute-force
the private key.

I think that Brute-forcing a private key without knowing the
public key would be more difficult and problematic, because some
network connection, smart card access or alike would be needed to
test whether a guessed key is correct or not.
When knowing the public key this can be determined quickly.
Otherwise, tracks on networks could be left, smartcards fail
counters may exeede or alike.
Waiting for smartcards to compute RSA or networks to reply also
should be much slower (limiting the number of key tests to a few
per minute).

Is this theoretically true (althrough far from practical effects)?

  (of course, it is considered hard to brute-force a reasonable
  private key, such as 1024 bit RSA.)


oki,

Steffen















































--[ end of message ]----------------------------------------------->8=======

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to