[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    Re: [Full-disclosure] stealing ssh keys
From:       Jeffrey Walton <noloader () gmail ! com>
Date:       2012-10-29 11:49:54
Message-ID: CAH8yC8mh0ibtK1YgZZ2OO2RPa36hFGo5DcSzjFQn39ow-BewVA () mail ! gmail ! com
[Download RAW message or body]

On Fri, Oct 26, 2012 at 10:49 PM, Raj Mathur (राज माथुर)
<raju@linux-delhi.org> wrote:
> On Thursday 25 Oct 2012, Ivaylo Hubanov wrote:
>> Yes Raj,
>> You almost got the RSA encryption/decryption flow. :) Just the
>> private key is used to sign the data and not to encrypt it.
>
> We're splitting hairs here :) but the private key is actually used to
> encrypt.  That encryption is called a signature.
I hate to split hairs, but "encrypt with the private key" is not a
valid cryptographic transform.

> Except, what you encrypt with the private key is a digest of the
> message, not the whole message itself.
When you sign, you treat the hash as an instance of cipher text and
you perform the inverse transform - you are "decrypting with the
private key"

Jeff

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic