Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RSA Decryption Primitive sp800-56Br2 Standard Calculations, Request for public exponent "e". #1409

Closed
prashantawde opened this issue Jan 27, 2023 · 9 comments

Comments

@prashantawde
Copy link

What type of change is being proposed?
Inclusion of public exponent "e" value in input vector set.

Details on suggestion
What would you like to see changed in the protocol specification?
https://pages.nist.gov/ACVP/draft-celi-acvp-rsa.html#name-test-cases-for-rsa-decryptio
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf Section: 7.1.2.2

Additional information
As per Section 7.1.2.2 of the NIST.SP.800-56Br2.pdf, we need to provide (p, q, d) and ciphertext to the API of Crypto modules.
image

Same values we are getting from ACVP server as part of test vectors:
image

But we have seen that some of the vendor's crypto modules are required to feed with public exponent "e" value to retrieve proper results from them. We have to put a workaround to calculate the public exponent "e" manually before given as input to crypto module APIs to get desired results, otherwise, we are always getting wrong and different results for the same input vectors.

Requesting to guide on same.

@jbrock24
Copy link
Collaborator

Hi @prashantawde. We are currently refactoring this algo to include the correct outputs. This will be released shortly. Thanks for the feedback!

@jbrock24 jbrock24 reopened this Feb 14, 2023
@jbrock24
Copy link
Collaborator

I will reply here when the update is done and pushed!

@ehanson12
Copy link

@jbrock24 Is the update done and pushed?

@jbrock24
Copy link
Collaborator

Hi @ehanson12 , sorry I missed this. This is along the same lines as RSASP, it's being worked side-by-side, and will release after review to demo for testing, and then sometime after - once sufficiently publicly tested - released to production.

@ehanson12
Copy link

@jbrock24 Thanks Joel!

@jbrock24
Copy link
Collaborator

jbrock24 commented Apr 28, 2023

Hi @ehanson12 & @prashantawde, the recent update hotfix for v1.1.0.28 corrects this issue. It should be on both demo and prod by looks of the notes. Thanks for the input!

@ehanson12
Copy link

@jbrock24 Much appreciated Joel!

@prashantawde
Copy link
Author

Thanks for fix @jbrock24. I will check and update.

@jbrock24
Copy link
Collaborator

jbrock24 commented May 5, 2023

No worries!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants