![]() It appears to be used for thread-safety of the implementation. mutex is internal to the implementation, and isn't a number.blindfac_inverse is the inverse of blindfac modulo n, used for the blinding process.It is used during these operations to hide the value of private numbers from timing and power attacks: to "blind" timing attacks. blindfac is a random number chosen during decryption or signing. ![]() It's the coefficient for the CRT speedup technique. The fact that it's smaller is important to the meaning of coef. This is because in RSA, for any $m$ in range, $(m^e)^d \equiv (m^d)^e \equiv m \pmod n$. Taking a number to power d (modulo n) is the inverse operation to taking a number to power e. e is the public exponent, the power to which a message is taken to encrypt it (or validate its signature).n is the modulus, the number modulo which key operations are done.I looked up this implementation and found the following meaning: Some of these numbers improve signing/decryption speed of the private key if you know them, so RSA implementations often keep them with the private key for speed. These are numbers that if you know them, you can calculate the rest of the private key quickly. In RSA, there are various numbers that are (kind of) equivalent to the private key, but aren't the private key per se.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |