Forums: » Register « |  Free Tools |  User CP |  Games |  Calendar |  Members |  FAQs |  Sitemap |  Support |

New Free Tools on Dev Shed!

#1
June 28th, 2013, 07:31 AM
 mbga9pgf
Registered User

Join Date: Jun 2013
Posts: 1
Time spent in forums: 39 m 50 sec
Reputation Power: 0
Assymetric Crypto Question

Hi all, first post.

I am trying to find a little info behind the background workings of typical Assymetric Encryption (EG rsa and PGP).

As I am currently picking up on crypyto theory prior to deploying it in an app, I was wondering if someone had any answers to the following questions:

1) Do small changes to the pre-encrypted message result in large changes in the cyphertext a la hashing, or are the changes in cyphertext limited to only part of the cyphertext? I am unsure as to how the algorithms work, do they encrypt an entire message or do they encrypt a part of the message limited to the assymetric key length?

IE

longstring(bitlength of 3072) * F(Public key encryption bitlength 1024) = cyphertext(3072)

Or does it result in this

longstring(bitlength of 3072) * F(Public key encryption bitlength 1024) = Cyphertext(1024) & Cyphertext(1024) & Cyphertext(1024)?

assuming the second example above is valid,

Question
2)

IF you had hold of both the cyphertext and the part of the message corresponding to the cyphertext, how easily would it be to generate the private key from this information and are there any equations out there that can rapidly generate private keys from knowing the cyphertext and the original message from which the cyphertext was generated?

#2
June 28th, 2013, 02:30 PM
 salem
Contributed User

Join Date: Jun 2005
Posts: 4,262
Time spent in forums: 2 Months 4 Weeks 1 Day 15 h 46 m 48 sec
Reputation Power: 1827
1. Depends on the mode of operation of your cipher.
https://en.wikipedia.org/wiki/Block...de_of_operation

2. What you're describing is a known plaintext attack (or even chosen plaintext attack)
http://en.wikipedia.org/wiki/Catego...graphic_attacks
Good algorithms are highly resistant to such attempts.
__________________
If you dance barefoot on the broken glass of undefined behaviour, you've got to expect the occasional cut.
If at first you don't succeed, try writing your phone number on the exam paper

 Viewing: Dev Shed Forums > System Administration > Security and Cryptography > Assymetric Crypto Question