From: Alan <alan@ctrl-alt-del.com>
To: nospam-seesignature@ceddec.com
Message Hash: cc9db2b523cf8eaa9b49a4b671226c7c7ecb8aed351eed6c2683491313e2d30d
Message ID: <Pine.LNX.3.95.970813150821.21950A-100000@www.ctrl-alt-del.com>
Reply To: <97Aug13.172635edt.32257@brickwall.ceddec.com>
UTC Datetime: 1997-08-13 22:51:33 UTC
Raw Date: Thu, 14 Aug 1997 06:51:33 +0800
From: Alan <alan@ctrl-alt-del.com>
Date: Thu, 14 Aug 1997 06:51:33 +0800
To: nospam-seesignature@ceddec.com
Subject: Re: Encrypting same data with many keys...
In-Reply-To: <97Aug13.172635edt.32257@brickwall.ceddec.com>
Message-ID: <Pine.LNX.3.95.970813150821.21950A-100000@www.ctrl-alt-del.com>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, 13 Aug 1997 nospam-seesignature@ceddec.com wrote:
> > Would it not make sense to scatter the random padding throughout the
> > block? How is this normally done? Front? Back? Middle? Scattered?
>
> The location does not matter. The standard RSA libs place the padding at
> the front - it is one of those PKCS specifications.
Actually it does matter. At the front is best with a chaining cypher.
(The random padding will cascade down through the rest of the data.) With
adding it on the end, given all other factors being the same, the data
before the random padding will be the same as well.
alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen | to my mail, just hit the ctrl, alt and del keys.
Return to August 1997
Return to “Ray Arachelian <sunder@brainlink.com>”