Re: is breaking RSA at least as hard as factoring or vice-versa?

2006-04-02 Thread Taral
On 4/2/06, Travis H. <[EMAIL PROTECTED]> wrote: > So I'm reading up on unconditionally secure authentication in Simmon's > "Contemporary Cryptology", and he points out that with RSA, given d, > you could calculate e (remember, this is authentication not > encryption) if you could factor n, which re

Re: is breaking RSA at least as hard as factoring or vice-versa?

2006-04-02 Thread Greg Rose
At 1:41 -0600 2006/04/02, Travis H. wrote: So I'm reading up on unconditionally secure authentication in Simmon's "Contemporary Cryptology", and he points out that with RSA, given d, you could calculate e (remember, this is authentication not encryption) if you could factor n, which relates the

Re: Unforgeable Blinded Credentials

2006-04-02 Thread Adam Back
On Sat, Apr 01, 2006 at 12:35:12PM +0100, Ben Laurie wrote: > However, anyone I show this proof to can then masquerade as a silver > member, using my signed nonce. So, it occurred to me that an easy > way to prevent this is to create a private/public key pair and > instead of the nonce use the hash

Re: Unforgeable Blinded Credentials

2006-04-02 Thread Apu Kapadia
I came across the same problem a couple of years ago (and indeed iterated through private/public key solutions with a colleague). The problem is that you can still give your private key to somebody else. There's no real deterrent unless that private key is used for many other purposes, th

is breaking RSA at least as hard as factoring or vice-versa?

2006-04-02 Thread Travis H.
So I'm reading up on unconditionally secure authentication in Simmon's "Contemporary Cryptology", and he points out that with RSA, given d, you could calculate e (remember, this is authentication not encryption) if you could factor n, which relates the two. However, the implication is in the less