Is there any published information on how Microsoft CryptoAPI
implements the RSA keypair generation procedure internally (i.e.
how entropy is used in the generation process) ?
- Michel Gallant
MVP Security
Specific information about how entropy is used can be found on the NIST web
site (http://csrc.nist.gov/cryptval/140-1/140sp/140sp240.pdf)
Kelvin Yiu [MSFT]
"Michel Gallant" <neu...@istar.ca> wrote in message
news:uM3tUePa...@TK2MSFTNGP12.phx.gbl...
"11. FIPS Approved Security Methods. Cryptographic modules that
comply with this standard shall employ cryptographic algorithms,
cryptographic key generation algorithms and key distribution
techniques, and authentication techniques that have been FIPS
approved for protecting Federal Government unclassified .."
I am interested in the specifics of the "key generation algorithms",
specifically how the 2 RSA primes are derived in CryptoAPI implementation.
Is that level of detail available? (still searching for it).
Thanks,
- Mitch
"Kelvin Yiu [MSFT]" <kel...@online.microsoft.com> wrote in message
news:upDO3zQa...@TK2MSFTNGP12.phx.gbl...
Asymmetric Key
There are no FIPS approved asymmetric key establishment techniques
at this time. .... commercially available methods may be used"
More specifics on CryptoAPI RSA key generation procedure?
Thanks,
- Mitch
"Kelvin Yiu [MSFT]" <kel...@online.microsoft.com> wrote in message
news:upDO3zQa...@TK2MSFTNGP12.phx.gbl...
Kelvin Yiu [MSFT]
--
This posting is provided "AS IS" with no warranties, and confers no rights.
Use of included script samples are subject to the terms specified at
http://www.microsoft.com/info/cpyright.htm
"Michel Gallant" <neu...@istar.ca> wrote in message
news:u0m509Xa...@TK2MSFTNGP12.phx.gbl...