From msuinfo!agate!howland.reston.ans.net!cs.utexas.edu!not-for-mail Fri Apr 29 22:36:09 1994 Path: msuinfo!agate!howland.reston.ans.net!cs.utexas.edu!not-for-mail From: jmire@lsumc.edu (John Mire) Newsgroups: alt.security.ripem,comp.sys.mac.system Subject: RE>Re: Using AOCE approval files as RIPEM keys Date: 28 Apr 1994 17:09:11 -0500 Organization: UTexas Mail-to-News Gateway Lines: 24 Sender: daemon@cs.utexas.edu Message-ID: <9404281709.AA06811@endo1.med.lsumc.edu> NNTP-Posting-Host: cs.utexas.edu Xref: msuinfo alt.security.ripem:694 comp.sys.mac.system:52494 Newsgroups: alt.security.ripem,comp.sys.mac.system Keywords: RIPEM AOCE RSA Encryption On Thu, 31 Mar 1994 08:19:14 GMT,strnlght@netcom.com (David Sternlight) wrote: :>In article <2nd031$1j1t@inca.gate.net>,Joseph Block wrote: :>Due to the overwhelming torrent of "Me Too" letters, here is what I found :>out about using your AOCE key to encrypt messages with RIPEM. :> :>RIPEM Mac 0.8.5b1 will allow you to import RSA key information from an :>approved AOCE signer file. It is available from ripem.msu.edu. : :Unless you jigger the AOCE Digisign Utility's PREF resource with ResEd :before generating your signer to be certified, it will generate only :512bit RSA keys, not the most secure. : Please enlighten me, since in my copy of the DigiSign Utility, there is no PREF resource, what is it's resource ID and what is the patch to generate say a 768 bit key. -- John Mire: jmire@lsumc.edu From msuinfo!agate!howland.reston.ans.net!math.ohio-state.edu!magnus.acs.ohio-state.edu!csn!csus.edu!netcom.com!strnlght Fri Apr 29 22:36:25 1994 Newsgroups: alt.security.ripem,comp.sys.mac.system Path: msuinfo!agate!howland.reston.ans.net!math.ohio-state.edu!magnus.acs.ohio-state.edu!csn!csus.edu!netcom.com!strnlght From: strnlght@netcom.com (David Sternlight) Subject: >Using AOCE approval files as RIPEM keys Message-ID: Reply-To: david@sternlight.com (David Sternlight) Organization: DSI/USCRPAC References: <9404281709.AA06811@endo1.med.lsumc.edu> Date: Fri, 29 Apr 1994 07:23:42 GMT Lines: 20 Xref: msuinfo alt.security.ripem:702 comp.sys.mac.system:52525 In article <9404281709.AA06811@endo1.med.lsumc.edu>, John Mire wrote: >: >Please enlighten me, since in my copy of the DigiSign Utility, there is >no PREF resource, what is it's resource ID and what is the patch to >generate say a 768 bit key. Oops. It's the PRFS resource. Apple has so far refused to say, and I've been getting the run around between Apple Developer Services and RSADSI. Try experimenting with it. There's only one non-zero hex value in there. Try making it bigger, or moving the non-zero bits to the left. I made one test, and got what looks like a 1024 bit key. Let me know how you make out. If any other reader knows the facts, a post would be welcome. David