-----BEGIN PGP SIGNED MESSAGE----- In list.cypherpunks, someone wrote:
Note that RSA normally is used as probabilistic encryption: encrypt the same plaintext twice, and you'll likely get two different ciphertexts.
I think you're confusing PGP's use of random session keys and random padding with actual RSA encryption. Using RSA alone on a given plaintext will always give you the same ciphertext. - -- Roy M. Silvernail [ ] roy@cybrspc.mn.org PGP Public Key fingerprint = 31 86 EC B9 DB 76 A7 54 13 0B 6A 6B CC 09 18 B6 Key available from pubkey@cybrspc.mn.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMQN/6Rvikii9febJAQGCwwP+LGSeA56pCk9kFIULEuNX9B7VxBV5oYho y2JsyjdrJayUzVDS6iqhzFSrHHM8QSq3C3MlAmriXx52BdbFOZZ6lduV35hZKAjb TELDjeKixe/8BiDajP+98XcOSABqhTgvG/QgXV12dyuvr6uJETw8v1m5VkHH+svn BElJdmt5ZL8= =Dc+e -----END PGP SIGNATURE-----
On Mon, 22 Jan 1996, Roy M. Silvernail wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Note that RSA normally is used as probabilistic encryption: encrypt the same plaintext twice, and you'll likely get two different ciphertexts.
I think you're confusing PGP's use of random session keys and random padding with actual RSA encryption. Using RSA alone on a given plaintext will always give you the same ciphertext.
RSA used in a raw mode will always give the same plaintext for the same cyphertext; however most uses of RSA use (or at least should use) PKCS1 random padding - thus the plaintext passed to RSA will be different each time. Simon
participants (2)
-
roy@sendai.cybrspc.mn.org -
Simon Spero