> -----Original Message----- > From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Jakob Bohm > Sent: Thursday, January 10, 2013 6:56 PM > To: openssl-users@openssl.org > Subject: Re: RSA_private_decrypt function takes longer time. [...]
> > Coming back to this. I dumped the PEM key in text format, and it > shows n, d, dQ, dP, qInv, p and q. > > Does that mean my private key is not just a 'd-only' key? > > That means you have a key with all the extra numbers for "Chinese > Remaineder Theorem" based speedups. (n, e) is your public key. > (n, d) is your "d-only-cannot-get-the rest" private key. (n, d, e) > is your "d-only-can-figure-out-the-rest" private key. (n, d or e, p or > q) is your "enough-to-figure-out-the-rest" private key. (n, d, dQ, dP, > qIn, p, q) is your "all-the-details-already-there" private key. > > So this is good, if you have a safe place to store all those numbers. Appreciate the explanation. Thanks. So I feel like I should try some hardware for asymmetric decryption, in order to push the performance. [...] > Enjoy > > Jakob > -- -- Thanks, Nilesh ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org