home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!cs.utexas.edu!sun-barr!news2me.EBay.Sun.COM!cronkite.Central.Sun.COM!texsun!wb9rxw!kf5iw!k5qwb!lrk
- From: lrk@k5qwb.lonestar.org (Mr. Lyn R. Kennedy)
- Newsgroups: sci.crypt
- Subject: RSA
- Message-ID: <226XVB4w164w@k5qwb.lonestar.org>
- Date: 17 Dec 92 22:09:12 GMT
- Organization: Radio Amateur k5qwb
- Lines: 26
-
- I haven't seen these items mentioned but I'm not a math whiz so maybe
- it's hidden in there somewhere.
-
- You can get an encode/decode pair ( e and d ) by taking d*e mod
- (p-1)*(q-1) = 1. This implies that the smallest value for d*e
- is ((p-1)*(q-1))+1 but it's actually (((p-1)*(q-1))/2)+1. If fact, d*e
- must be some value (((p-1)*(q-1)/2)*x)+1 where x is any integer >0
-
- Also, for ANY value of n ( =p*q), there are at least nine values of m
- (the message) that will encrypt as m. I.e. E(m) = m and D(m) = m. Three
- of these are trivial, m=0, 1, and n-1. The other six allow factoring n.
- For some values of e, there are more cases but I'm not sure how easy it
- would be to get the factors knowing one of those. This brings up the
- question of whether the proceedure should watch for such cases. Only
- while signing a message would the sender be the one to discover key was
- compromised. I know it's not at all likely but it seems like it could
- cause problems.
-
-
- -------------------------------------------------------------------------
-
- 73, internet | lrk@k5qwb.lonestar.org
- Lyn Kennedy packet radio | K5QWB @ N5LDD.#NTX.TX.US.NA
- pony express | P.O. Box 5133, Ovilla, TX, USA 75154
-
- -------------- "We have met the enemy and he is us." Pogo --------------
-