Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: stealing ssh keys
From: Jeffrey Walton <noloader () gmail com>
Date: Mon, 29 Oct 2012 07:49:54 -0400

On Fri, Oct 26, 2012 at 10:49 PM, Raj Mathur (राज माथुर)
<raju () linux-delhi org> wrote:
On Thursday 25 Oct 2012, Ivaylo Hubanov wrote:
Yes Raj,
You almost got the RSA encryption/decryption flow. :) Just the
private key is used to sign the data and not to encrypt it.

We're splitting hairs here :) but the private key is actually used to
encrypt.  That encryption is called a signature.
I hate to split hairs, but "encrypt with the private key" is not a
valid cryptographic transform.

Except, what you encrypt with the private key is a digest of the
message, not the whole message itself.
When you sign, you treat the hash as an instance of cipher text and
you perform the inverse transform - you are "decrypting with the
private key"

Jeff

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault