At 05:30 AM 5/31/02 -0700, surinder pal singh makkar wrote:
>Hi List,
>
>I am a newbie in cryptography. What I have learnt till
>now is that in assymeric cryptography scenario we have
>a private key and we generate the public key
>corresponding to it and then we send it to the central
>agency.
Co
- Original Message -
From: "surinder pal singh makkar" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, May 31, 2002 5:30 AM
Subject: CDR: How can i check the authenticity of a private key
> Hi List,
>
> I am a newbie in cryptography. What I ha
On Fri, 31 May 2002, Mike Rosing wrote:
> With ECC you just recompute the public key from the private
> key and make sure it matches what's out in public. With
> RSA you just pick some random value (not zero or 1) and
> see if r^(e*d) = 1 mod N, or if you know p and q (where
> N = p*q) check tha
hi,
I was helping a friend if mine with rsa key
generation.if it helps u here it is.
I am posting the mail which i sent to him.
1:>Choose 2 large prime numbers p & q
2:>choose n=p*q & z=(p-1)*(q-1)
3:>choose a number relatively prime to z anc call it
d.
two numbers (a,b) are said to be rela
On Fri, 31 May 2002, surinder pal singh makkar wrote:
> I am a newbie in cryptography. What I have learnt till
> now is that in assymeric cryptography scenario we have
> a private key and we generate the public key
> corresponding to it and then we send it to the central
> agency.
You don't have
Hi List,
I am a newbie in cryptography. What I have learnt till
now is that in assymeric cryptography scenario we have
a private key and we generate the public key
corresponding to it and then we send it to the central
agency.
Suppose after sometime I have a private key and the
public key. Is the