Why don't we glue the private key in an asymmetric cryptographic system?

With the standard use of an asymmetric cryptographic system, encryption is performed using the public key, decryption with the private key.

Turning to the process, “private key encryption” is called “signature”.

Standard tools, despite the terminology and the lack of direct tools, allow you to implement an encryption system that will use the private key for encryption.

Can someone explain why such a solution is vulnerable?

User Case:

Keep in mind that Alice wants to send Bob some things in an unconventional way:

Alice and Bob once met, and Alice gave Bob the "public key" created using the private key she created, but she warned Bob to keep it secret. And she kept secret the secret key and had not yet given anyone the public key.

Can Bob make sure that the messages he receives from Alice (provided that they are encrypted with Alice’s private key) can only be read by him (if he really saved his copy of Alice’s secret key)?

And how does he compare this hardness of encryption with the traditional way, which in our case would be Bob sending messages to Alice (encrypted with Alice’s public key)?

Question about

, "private" "public", . , " " , "" . , , : "public" "private" , " " " ".

, .

, , - .

Stackoverflow, , " " " " ( ). RSA, , , . openssl RSA:

  • .

" " " " , " " " "?

, " " . " " . " " " ".

RSA :

RSA (, openssl) , . :

  • " "
  • .

. ! , ...

:

  • ( stackoverflow), , , REAL.
  • , , .
  • " "
+3
6

, .

, . , , . Bob ( " " , , , ). , (, , , ) .

, , , , , , . , , . , (), Alice. , , , , -, ( ), ( ), .

, , AES. ( ) . - . , ; .

, , , , . , , . (, 2 PDF), , .

, " " "".

; - . "Schneier" , , / , . , , . , , , . , ( ), , , . , .

- .

, , ( ). ; , . , , .


, 2009-09-05T13: 00-07: 00, , IMNSHO.

13 "RSA" " " (, - , 3.3 " " ).

. :

  • C = E (K, m) - ( , C), E, K on (plain text) m.
  • P = D (K, C) - ( , P), D K on () c.
  • , m = P, D (K, E (K, m)) = m.

, K , . , K ( , , " " , , - " " ), .

E a D a A. , K encrypt, E a, K decrypt, D a. , , K decrypt , K encrypt .

(S alice, P alice). S alice , P alice . , . , , :

  • S alice P alice .
  • - (S alice); , .
  • (P alice) .

, (S bob, P bob). :

  • S bob, P bob P alice.
  • S alice, P alice P bob.

, M alice-bob, ( ), Bob P < > > . , :

  • C alice-bob= E a (P bob, M alice-bob)

( ), P bob, , S bob:

  • M alice-bob= D a (S bob, C alice-bob)

, , , -, P bob. , , .

, , , , , , , S alice , , S bob. , P alice , P alice , P bob , , P bob . - , PKI ( ).

, , , , . , :

  • C1 alice-bob= E a (S alice, M alice-bob)
  • C2 alice-bob= E a (P bob, C1 alice-bob)

C2 alice-bob ( MAC, , ), :

  • D1 alice-bob= D a (S bob, C2 alice-bob)
  • D2 alice-bob= D a (P alice, D1 alice-bob)

, D2 alice-bob= M alice-bob.

RSA

RSA , ( ), e n, , m, c = m emod n. m, c ( e n). , , , d, r = c d mod n, r = m, e, d n. d e n, - .

RSA () , p q, n. RSA , n ( p q, n); - , RSA .

n, e d , :

  • ed = 1 mod t, t = LCM (p-1, q-1), LCM .

- , Schneier Ferguson e = 3. d , 6 . , d . (e, n) , (p, q, t, d) . e n, d n. " " (e 1, d 1) (e 2, d 2), n, e 1 , e 2 ; 3 5.


OpenSSL

, RSA OpenSSL, , .

, p q . , () ; . , n, d ( , e ). , OpenSSL, n, d.


:

, :

- , " " , , , , . .

. " " , .

, , ( , ), ( )?

, ; , , , .

, , ( )?

Confusion: , ; , .

, P alice. , P bob. - , .

, , P alice, ( ) , S alice . , S bob, Bob P bob. .

, "private" "public", . , " " , "" . , , : "public" "private" , " " " ".

, . , . , , , , .

, .

, " " - , , , .

, , - .

, , ( Eve, eavesdropper) . , . , , , (, Eve), Alice, . , , - , , . . , , ( ), , , . , , , , .

+8

, -, , ( ). , , , - .

, - - , !

+6

, " " , . , , - [insert item here], - : public. , .

, toBob (, , ). , - , , , , , , , . , , , . - , . .


, , - , , . , RSA, , , - , . , . (/, /) "" , , , .

, ... . / - , . . " " " ", . Infact, , :

" " - , . " ".

+3

, / ( , ).

. - .

, , . , , . , , , 26 , 26x25 , 25 .

(, / ) . . , ( ) . . . 26x2, 1. , .

, , , 26x25x2 .

, . , , N^2-N, 2*N.

+1

, - , " ", .

- , . " " , " ". (, RSA). , BAN. missnomer - - , .

RSA , . CRT ( ) 4x . , . .

0

.

, , , , , , .

.

, . , - ? , , . , . , Alices, , , , . .

, , - , , , un -decryptable , . , (.. ), .

, , , , - , .

0

Source: https://habr.com/ru/post/1716767/


All Articles