Re: How can i check the authenticity of a private key

2002-05-31 Thread Major Variola (ret)
At 05:30 AM 5/31/02 -0700, surinder pal singh makkar wrote: >Hi List, > >I am a newbie in cryptography. What I have learnt till >now is that in assymeric cryptography scenario we have >a private key and we generate the public key >corresponding to it and then we send it to the central >agency. Co

Re: How can i check the authenticity of a private key

2002-05-31 Thread Joseph Ashwood
- Original Message - From: "surinder pal singh makkar" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, May 31, 2002 5:30 AM Subject: CDR: How can i check the authenticity of a private key > Hi List, > > I am a newbie in cryptography. What I ha

Re: How can i check the authenticity of a private key

2002-05-31 Thread Jack Lloyd
On Fri, 31 May 2002, Mike Rosing wrote: > With ECC you just recompute the public key from the private > key and make sure it matches what's out in public. With > RSA you just pick some random value (not zero or 1) and > see if r^(e*d) = 1 mod N, or if you know p and q (where > N = p*q) check tha

Re: How can i check the authenticity of a private key

2002-05-31 Thread gfgs pedo
hi, I was helping a friend if mine with rsa key generation.if it helps u here it is. I am posting the mail which i sent to him. 1:>Choose 2 large prime numbers p & q 2:>choose n=p*q & z=(p-1)*(q-1) 3:>choose a number relatively prime to z anc call it d. two numbers (a,b) are said to be rela

Re: How can i check the authenticity of a private key

2002-05-31 Thread Mike Rosing
On Fri, 31 May 2002, surinder pal singh makkar wrote: > I am a newbie in cryptography. What I have learnt till > now is that in assymeric cryptography scenario we have > a private key and we generate the public key > corresponding to it and then we send it to the central > agency. You don't have

How can i check the authenticity of a private key

2002-05-31 Thread surinder pal singh makkar
Hi List, I am a newbie in cryptography. What I have learnt till now is that in assymeric cryptography scenario we have a private key and we generate the public key corresponding to it and then we send it to the central agency. Suppose after sometime I have a private key and the public key. Is the