1900+ entries in 0.135s

a111: Logged on 2017-07-22 22:40 mircea_popescu:
http://btcbase.org/log/2017-07-22#1689243 << depends what you mean by "
rsa encrypted message". a) current
rsa "encryption" as implemented by koch-gpg et al consists of encrypting a symmetric key. trivial to test this against a number of
rsa keys. b) conceivably item will include a courtesy key fp to help you know.
PeterL: no, I was imagining straight
RSA a111: Logged on 2017-07-22 22:32 PeterL: so I wanted to make sure I understood this correctly, if you have an
RSA encrypted message, you cannot say which key it was encrypted to just by looking at it, right?
mircea_popescu:
http://btcbase.org/log/2017-07-22#1689243 << depends what you mean by "
rsa encrypted message". a) current
rsa "encryption" as implemented by koch-gpg et al consists of encrypting a symmetric key. trivial to test this against a number of
rsa keys. b) conceivably item will include a courtesy key fp to help you know.
☝︎☟︎ PeterL: so I wanted to make sure I understood this correctly, if you have an
RSA encrypted message, you cannot say which key it was encrypted to just by looking at it, right?
☟︎ PeterL: sufficient to work as message padding for
rsa-grams?
sina: anyhooz. patience from the usual suspects on
RSA discussion greatly appreciated. must be off, have wonderful days all.
mircea_popescu: otherwise, in order of cheapness-effectivity : 1) get an isolated box for
rsa ops. this shouldn't ever connect ot the internet. stuffing into it a stick which was in a net-connected machine counts.
sina: "today, until a constanttime solution is in place, gpg is the tool of choice for
RSA encryption. any time you use it, you can't know whether you have completely compromised your private key. and we use it anyway."
sina: and yet, here we all are, encrypting, decrypting, signing ascii with some
RSA stuff all the time, in spite of that
sina: can I safely state, if I want to email trinque
RSA encrypted cake recipe, that asciilifeform can never read it?
sina: asciilifeform: so what software do you currently use for
RSA encryption
sina: but if I write an email on my box, encrypt it with
RSA, then send it...what timing info can be derived?
mircea_popescu: sina you mean, is there a side channel for constant time ops ? or for
rsa as commonly implemented atm ?
sina: asciilifeform: basically I am wondering about the "threat model" of constanttime sidechannel stuffs. for example, let's say I want to write you an email with
RSA encrypted body, or receive same from you, is there really a sidechannel there? I guess I'm asking in terms of async vs sync encrypted comms
whaack: what's the point of learning crypto for plebians, the concepts are too hard to follow. there are so many traps in number theory, and the argument to believe that using a scheme like
RSA is secure requires understanding so many lemmas. It's so easy to make a false proof, how can one not believe they're not being duped (intentionally or unintentionally) along the way to enlightenment. The one time pad is really the only thing I trust to t