Answer the question
In order to leave comments, you need to log in
Should you use RSA?
Should RSA be used to encrypt and decrypt text now? And how long is the key?
If RSA is not worth it, then what to use?
Answer the question
In order to leave comments, you need to log in
And yes and no at the same time.
(updated, because I suddenly read it and didn’t understand half - apparently I wrote on the "stream")
RSA should only be used to encrypt other keys - the keys of symmetric encryption algorithms. AES, GOST 28147-89, 3DES and others. Why? First, symmetric algorithms are more resistant to hacking with a large known private text, while asymmetric encryption is potentially flawed. In the sense that (almost) any asymmetric encryption uses an NP-class problem (more precisely, an NP-complete problem): number factorization (RSA), decoding of full (general) linear codes (McEliece), calculation of a discrete logarithm on an eleptic curve (GOST R 34.10-2012), or in the final field (Elgamal). Another thing is that any of this problem is potentially solvable. In the case of symmetric encryption, one really should only hope for a miracle (in GOST it is allowed to choose any s-boxes, so there is nothing left for the cryptanalyst, how to pray to the proletariat in the hope of thermorectal cryptanalysis). In the case of an asymmetric cipher, two things come into play - the high complexity of implementing a truly secure algorithm (asymmetric ciphers are very complex and full of nuances, not taking into account which you can easily destroy the system), low speed (due to the fact that you have to use very abstract mathematical functions that are difficult to implement in hardware and fraught with many low-level operations) when requiring very long keys, they force the use of small keys in order not to wait forever.
However. There is a strange paradox here. If the data is very important and several million raccoons can be killed to protect it, then only an asymmetric cipher should be used. Because it potentially gives more durability. The paradox here is that if the classes P and NP are unequal, then we get almost ideal and affordable protection, since there is the possibility of complex organizational protection.
(a lot was sent to the firebox here)
Okay, let's look at the standard scheme with Alice, Bob and Eve:
Алиса -> c = E(m, Eb) -> -------- -> D(c, Db) -> Боб (
|
|
v
Ева <- c, E, D, d
RSA in its purest form is not well suited for data encryption (as well as any other encryption algorithm in its purest form). This should not be taken to mean that an encrypted message can be easily decrypted. But two identical messages in encrypted form will match. It is considered bad.
All asymmetric ciphers are very slow. Therefore, they are only used to encrypt the symmetric cipher key that is used to encrypt the message. (The symmetric cipher is also not used in its pure form, see Encryption mode ).
Use a key length of at least 2048 bits.
For what purpose did you need it?
bugtraq.ru/library/crypto/rsa.html The
question is, what do you want to encrypt? if this is super-important data, look at commercial CIPF. That is, how strong the damage can be if the information falls into third hands, but if it is something like notes while studying or cute pictures of girlfriends, then a password-protected archive with a long key is enough.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question