diff options
Diffstat (limited to 'pipermail/pycrypto/attachments/20091101/d52ebd8e/attachment.htm')
-rw-r--r-- | pipermail/pycrypto/attachments/20091101/d52ebd8e/attachment.htm | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/pipermail/pycrypto/attachments/20091101/d52ebd8e/attachment.htm b/pipermail/pycrypto/attachments/20091101/d52ebd8e/attachment.htm new file mode 100644 index 0000000..5273479 --- /dev/null +++ b/pipermail/pycrypto/attachments/20091101/d52ebd8e/attachment.htm @@ -0,0 +1,29 @@ +<tt> +It is essentially the same as the patch I implemented, I have attached an attempt to prove (the best I can do quickly) that this check is sufficient to guarantee that GCD(e, (p-1)(q-1))=1. It did not seem immediately intuitive to me so I tried to prove it.<div><br> +<br></div><div>Thanks!</div><div>Anthony Honstain<br><br><div class="gmail_quote">On Sun, Nov 1, 2009 at 5:04 PM, Dwayne C. Litzenberger <span dir="ltr">&lt;<a href="mailto:dlitz@dlitz.net">dlitz@dlitz.net</a>&gt;</span> wrote:<br><br> +<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;"><div class="im">On Mon, Aug 03, 2009 at 09:41:50PM -0400, Dwayne C. Litzenberger wrote:<br><br> +<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br> +On Wed, May 27, 2009 at 09:50:07PM -0700, Anthony Honstain wrote:<br><br> +<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br> +In the generate_py function of lib/Crypto/PublicKey/_RSA.py , it would<br><br> +appear to be possible that the the primes p and q can be generated such that<br><br> +the GCD( 65537, (p-1)(q-1)) != 1 which would result in a unusable key. If<br><br> +anyone can clarify this it would be greatly appreciated.<br><br> +</blockquote><br> +<br><br> +I haven&#39;t looked into this claim yet, but I&#39;ve filed a bug report:<br><br> +<br><br> + <a href="https://bugs.launchpad.net/pycrypto/+bug/408660" target="_blank">https://bugs.launchpad.net/pycrypto/+bug/408660</a><br><br> +</blockquote><br> +<br></div><br> +Lorenz Quack has posted a patch that he says will solve this problem. It checks that e does not divide p-1 or q-1.<br><br> +<br><br> +That should fix this bug, right?<div class="im"><br><br> +<br><br> +-- <br><br> +Dwayne C. Litzenberger &lt;<a href="mailto:dlitz@dlitz.net" target="_blank">dlitz@dlitz.net</a>&gt;<br><br> + Key-signing key - 19E1 1FE8 B3CF F273 ED17 4A24 928C EC13 39C2 5CF7<br></div><div><div></div><div class="h5"><br> + Annual key (2009) - C805 1746 397B 0202 2758 2821 58E0 894B 81D2 582E<br><br> +</div></div></blockquote></div><br></div><br> + +</tt> |