Discussion:
An advantage of RSA encryption
(too old to reply)
Mok-Kong Shen
2015-07-31 20:31:50 UTC
Permalink
The fact that anyone could send an encrypted message to the owner of
a RSA public key in asymmetric encryption could be valuable in cases
e.g. activists in non-democratic countries send (if they manage to
anonymously send, eventually from a Internet cafe etc.) encrypted
messages to the press in democratic foreign countries containing
informations that, for some reasons, should not be immediately revealed
to the public, nor known to any third parties. (The press might prefer
obtaining such anonymous encrypted messages. The public key is simply
announced in the media.)

M. K. Shen
Mok-Kong Shen
2015-08-01 09:20:07 UTC
Permalink
Am 31.07.2015 um 22:31 schrieb Mok-Kong Shen:
[snip]

For a fairly simple and self-sufficient code (employing not
probabilistic but provable primes) to perform end-to-end RSA
encryption, see http://s13.zetaboards.com/Crypto/topic/7234475/1/

M. K. Shen
William Unruh
2015-08-01 12:55:55 UTC
Permalink
Post by Mok-Kong Shen
[snip]
For a fairly simple and self-sufficient code (employing not
probabilistic but provable primes) to perform end-to-end RSA
encryption, see http://s13.zetaboards.com/Crypto/topic/7234475/1/
To use RSA for end to end encryption is lunacy. It is incredibly slow to
encrypt and decrypt. To Use RSA to encrypt the key for a fast symmetric
cypher and then encrypt the contents with that cypher, get PGP or GPG.
Post by Mok-Kong Shen
M. K. Shen
Mok-Kong Shen
2015-08-01 13:47:07 UTC
Permalink
Post by William Unruh
Post by Mok-Kong Shen
[snip]
For a fairly simple and self-sufficient code (employing not
probabilistic but provable primes) to perform end-to-end RSA
encryption, see http://s13.zetaboards.com/Crypto/topic/7234475/1/
To use RSA for end to end encryption is lunacy. It is incredibly slow to
encrypt and decrypt. To Use RSA to encrypt the key for a fast symmetric
cypher and then encrypt the contents with that cypher, get PGP or GPG.
Have you ever tried my codes?? For a message of 10000 characters, the
encryption and decryption the cpu times on my PC are 2 and 4 sec
respectively. What would you as a private person need any higher
efficiency??

M. K. Shen
William Unruh
2015-08-01 16:52:07 UTC
Permalink
Post by Mok-Kong Shen
Post by William Unruh
Post by Mok-Kong Shen
[snip]
For a fairly simple and self-sufficient code (employing not
probabilistic but provable primes) to perform end-to-end RSA
encryption, see http://s13.zetaboards.com/Crypto/topic/7234475/1/
To use RSA for end to end encryption is lunacy. It is incredibly slow to
encrypt and decrypt. To Use RSA to encrypt the key for a fast symmetric
cypher and then encrypt the contents with that cypher, get PGP or GPG.
Have you ever tried my codes?? For a message of 10000 characters, the
encryption and decryption the cpu times on my PC are 2 and 4 sec
respectively. What would you as a private person need any higher
efficiency??
I rest my case.
William Unruh
2015-08-01 12:53:25 UTC
Permalink
Post by Mok-Kong Shen
The fact that anyone could send an encrypted message to the owner of
a RSA public key in asymmetric encryption could be valuable in cases
e.g. activists in non-democratic countries send (if they manage to
anonymously send, eventually from a Internet cafe etc.) encrypted
messages to the press in democratic foreign countries containing
informations that, for some reasons, should not be immediately revealed
to the public, nor known to any third parties. (The press might prefer
obtaining such anonymous encrypted messages. The public key is simply
announced in the media.)
Once again you are 20 years behind. This was one of the stated purposes
of PGP when Zimmermann released it.
Post by Mok-Kong Shen
M. K. Shen
Mok-Kong Shen
2015-08-04 13:04:42 UTC
Permalink
... The press might prefer obtaining such anonymous encrypted
messages. ...

Addendum: Since the press couldn't know the sender of the informations,
it has no responsibility, moral or otherwise, of reporting on the
source of informations.

M. K. Shen
William Unruh
2015-08-04 14:53:00 UTC
Permalink
Post by Mok-Kong Shen
... The press might prefer obtaining such anonymous encrypted
messages. ...
Addendum: Since the press couldn't know the sender of the informations,
it has no responsibility, moral or otherwise, of reporting on the
source of informations.
The press has a moral and legal responsibility to ensure that what it
prints is true, and has been checked for truth. Anonymous sources do not
provide that possibility.
Post by Mok-Kong Shen
M. K. Shen
Mok-Kong Shen
2015-08-04 22:37:37 UTC
Permalink
Post by William Unruh
Post by Mok-Kong Shen
... The press might prefer obtaining such anonymous encrypted
messages. ...
Addendum: Since the press couldn't know the sender of the informations,
it has no responsibility, moral or otherwise, of reporting on the
source of informations.
The press has a moral and legal responsibility to ensure that what it
prints is true, and has been checked for truth. Anonymous sources do not
provide that possibility.
It's the job of the journalists to realize that responsibility (at
least to the best possible). Anonymity of the activists saves them
from the (unnecessary) troubles that are otherwise to be expected,
if the non-democratic regimes somehow happen to learn that they are
the whistleblowers.

BTW, what is in your opinion the best way for the activists to leak
out informations to the outside world?

M. K. Shen

Loading...