Comment by upofadown
1 year ago
Exactly how is PKCS#1 v1.5 vulnerable in PGP usage? You might be confusing PGP usage with encrypted pipe applications like TLS.
>RSA forces the user to pick a public modulus and exponent, leading to all kinds of silly things that actually happen[
What PGP implementation forces the user to pick the public modulus and exponent?
> Exactly how is PKCS#1 v1.5 vulnerable in PGP usage?
Something that is often misused in a way that compromises security really needs to be proven secure rather than the opposite.