To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
In most RSA implementations I've seen, "e" is described as/considered part of the public key, even though it's almost always fixed as 65537 these days, but curve params are not considered part of the ECDSA public key but rather a separate thing.
-
-
It's frequently something other than 65537 for tor hidden services. I think OpenSSH has a different default value as well. Never seen it not considered part of the public key.
-
Yeah, but as it's a fixed parameter in practice, it isn't *really* different from curve parameters for ECC. Which is interesting.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.