← Back to context

Comment by upofadown

1 year ago

Exactly how is PKCS#1 v1.5 vulnerable in PGP usage? You might be confusing PGP usage with encrypted pipe applications like TLS.

>RSA forces the user to pick a public modulus and exponent, leading to all kinds of silly things that actually happen[

What PGP implementation forces the user to pick the public modulus and exponent?

> Exactly how is PKCS#1 v1.5 vulnerable in PGP usage?

Something that is often misused in a way that compromises security really needs to be proven secure rather than the opposite.