Changes between Version 1 and Version 2 of Ticket #162


Ignore:
Timestamp:
09/20/11 10:47:35 (13 years ago)
Author:
Antoine Martin
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #162 – Description

    v1 v2  
    55org.bouncycastle.crypto.DataLengthException: input too large for RSA cipher.
    66}}}
    7 I am still a bit puzzled as to why pycrypto manages to decrypt such blocks and BouncyCastle does not. Either we fix the data length using a specific padding scheme (as the length of the input looks fine as it is: <100bytes with 4096bit keys is ok), or we use a symmetric cipher for all encrypted packets (and exchange it during the login phase).
     7I am still a bit puzzled as to why pycrypto manages to decrypt such blocks and {{{BouncyCastle}}} does not. Either we fix the data length using a specific padding scheme (as the length of the input looks fine as it is: <100bytes with 4096bit keys is ok), or we use a symmetric cipher for all encrypted packets (and exchange it during the login phase).
    88
    99More info on this issue: [http://stackoverflow.com/questions/2579103/too-much-data-for-rsa-block-fail-what-is-pkcs7 Too much data for RSA block fail]