Full Disclosure mailing list archives
Re: stealing ssh keys
From: Jeffrey Walton <noloader () gmail com>
Date: Mon, 29 Oct 2012 07:49:54 -0400
On Fri, Oct 26, 2012 at 10:49 PM, Raj Mathur (राज माथुर) <raju () linux-delhi org> wrote:
On Thursday 25 Oct 2012, Ivaylo Hubanov wrote:Yes Raj, You almost got the RSA encryption/decryption flow. :) Just the private key is used to sign the data and not to encrypt it.We're splitting hairs here :) but the private key is actually used to encrypt. That encryption is called a signature.
I hate to split hairs, but "encrypt with the private key" is not a valid cryptographic transform.
Except, what you encrypt with the private key is a digest of the message, not the whole message itself.
When you sign, you treat the hash as an instance of cipher text and you perform the inverse transform - you are "decrypting with the private key" Jeff _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- stealing ssh keys Daniel Sichel (Oct 23)
- Re: stealing ssh keys Jacqui Caren (Oct 24)
- Re: stealing ssh keys Thor (Hammer of God) (Oct 24)
- Re: stealing ssh keys Raj Mathur (राज माथुर) (Oct 24)
- Re: stealing ssh keys Thor (Hammer of God) (Oct 24)
- <Possible follow-ups>
- Re: stealing ssh keys Ivaylo Hubanov (Oct 26)
- Re: stealing ssh keys Thor (Hammer of God) (Oct 26)
- Re: stealing ssh keys Jeffrey Walton (Oct 26)
- Re: stealing ssh keys Raj Mathur (राज माथुर) (Oct 26)
- Re: stealing ssh keys gold flake (Oct 29)
- Re: stealing ssh keys Jeffrey Walton (Oct 29)
- Re: stealing ssh keys Thor (Hammer of God) (Oct 26)
- Re: stealing ssh keys Jacqui Caren (Oct 24)