All Questions
6 questions
2votes
1answer
472views
What encryption algorithm is putty using?
I have setup an AlmaLinux9 server with SSHD. I have also generated a priv+pub key on my workstation, and when I check the algorithm used by my key it shows: ssh-keygen -l -f myprivatekey.pem 2048 ...
0votes
1answer
154views
Non-identified algorithm for RSA decryption in tpm-emulator
While analyzing the source code of tpm-emulator I found that the RSA key decryption uses an algorithm that is unknown to me. The original file with this mystery is located in rsa.c, where the ...
-3votes
1answer
162views
which algorithm/hash can possibly encrypt and decrypt certain data regardless of size?
I have intercepted some data for which i don't know which algorithm has been used to encrypt this data, this data has been for sure encrypted before transmitting, to decrypt the data i should ...
1vote
1answer
342views
Private and public key need to have same algorithm?
The private and the public key from the cert must have the same algorithm, correct? Yes of course pub / priv are a key pair. So this code would be legal, to be more flexible (e.g. ECDSA or DSA): ...
-7votes
1answer
585views
What is the excellence of RSA vs my algorithm [closed]
I was wondering that what make RSA Asymmetric Cryptography Algorithm special. So I wrote a very simple algorithm that do the same work (Generate Public and Private Key) Now I want to ask you that What ...
2votes
2answers
523views
Which part is the longest when gerating RSA key pairs?
Whether I use openssll or gnutls's certtool, I end in a single threaded part which take several minutes. When I try to compile the libraries with auto-parallelizer advanced efficient tools. It sill ...