On Digital Cash-like Payment Systems 
    Steven M. Bellovin 
    smb at cs.columbia.edu
       
    Mon Nov  7 11:16:13 EST 2005
    
    
  
In message <d4f1333a0511041709j48703e7aqe2d694b0366ccccc at mail.gmail.com>, "Trav
is H." writes:
>By my calculations, it looks like you could take a keypair n,e,d and
>some integer x and let e'=e^x and d'=d^x, and RSA would still work,
>albeit slowly.  Reminds me of blinding, to some extent, except we're
>working with key material and not plaintext/ciphertext.
>
Don't ever encrypt the same message twice that way, or you're likely to 
fall to a common modulus attack, I believe.
		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
    
    
More information about the cryptography
mailing list