114
Views
2
Comments
[CryptoAPI] How to encrypt with out OAEP padding (CryptoAPI 2.1.1)
Question
cryptoapi
Service icon
Forge asset by João Barata

I have public key and i want to encrypt data by RSA_Encrytp function. But i need encrypt by only RSA algorithm , because encrypt by your function data invalid. I tried encrypt by https://8gwifi.org/rsafunctions.jsp and select RSA on RSA Cipters ,it work !!!

2014-02-13 10-06-38
Ricardo Silva

Hello Thirajet,

"textbook" RSA encryption is utterly broken and not secure. With CryptoAPI you can only encrypt using one of two padding modes: OAEP (the most secure one) and PKCS1.5.

You can select which padding you want to use using the new parameters for the RSA_Encrypt functions introduced in version 2.0 of CryptoAPI.

I was testing your site and it seems that for the same key and plaintext it generates a different ciphertext. This is a strong indicator that in "RSA" mode it's using OAEP or some other form of randomized encryption / padding.

Do you have a sample of the code being used in the backoffice to clear out what algorithm specifically is being used?

UserImage.jpg
Thirajet Puengnuam

Ricardo Silva wrote:

Hello Thirajet,

"textbook" RSA encryption is utterly broken and not secure. With CryptoAPI you can only encrypt using one of two padding modes: OAEP (the most secure one) and PKCS1.5.

You can select which padding you want to use using the new parameters for the RSA_Encrypt functions introduced in version 2.0 of CryptoAPI.

I was testing your site and it seems that for the same key and plaintext it generates a different ciphertext. This is a strong indicator that in "RSA" mode it's using OAEP or some other form of randomized encryption / padding.

Do you have a sample of the code being used in the backoffice to clear out what algorithm specifically is being used?


Thank you for reply.
Currently i have using another solution. So i don't have problem now. :)

Community GuidelinesBe kind and respectful, give credit to the original source of content, and search for duplicates before posting.