Question about how RSA keys are generated in GnuPG
Anthony Papillon
papillion at gmail.com
Sun Apr 29 13:02:17 CEST 2012
Thank you sir!
Anthony
--
Sent from my mobile device
On Apr 29, 2012, at 4:12 AM, Werner Koch <wk at gnupg.org> wrote:
> On Sun, 29 Apr 2012 04:08, papillion at gmail.com said:
>
>> This is a stupid question I'm sure but I can't seem to find an answer
>> to it in the source code so I thought I'd ask here. When GnuPG is
>
> Tou need to look into Libgcrypt. From its manual:
>
> The generation of random prime numbers is based on the Lim and Lee
> algorithm to create practically save primes. at footnote{Chae Hoon Lim
> and Pil Joong Lee. A key recovery attack on discrete log-based shemes
> using a prime order subgroup. In Burton S. Kaliski Jr., editor,
> Advances in Cryptology: Crypto '97, pages 249 -263, Berlin /
> Heidelberg / New York, 1997. Springer-Verlag. Described on page 260.}
> This algorithm creates a pool of smaller primes, select a few of them
> to create candidate primes of the form @math{2 * p_0 * p_1 * ... * p_n
> + 1}, tests the candidate for primality and permutates the pool until
> a prime has been found. It is possible to clamp one of the small
> primes to a certain size to help DSA style algorithms. Because most
> of the small primes in the pool are not used for the resulting prime
> number, they are saved for later use (see @code{save_pool_prime} and
> @code{get_pool_prime} in @file{cipher/primegen.c}). The prime
> generator optionally supports the finding of an appropriate generator.
>
>
> Shalom-Salam,
>
> Werner
>
> --
> Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
>
More information about the Gnupg-users
mailing list