90 lines
4.4 KiB
Plaintext
90 lines
4.4 KiB
Plaintext
AlgorithmType: Signature
|
|
Name: RSA/PKCS1-1.5(MD2)
|
|
KeyFormat: DER
|
|
Source: http://www.rsasecurity.com/rsalabs/pkcs/index.html, \
|
|
Some Examples of the PKCS Standards
|
|
PrivateKey: \
|
|
30 82 01 50\
|
|
02 01 00 #version = 0\
|
|
30 0d #privateKeyAlgorithmIdentifier\
|
|
06 09 #algorithm = rsaEncryption\
|
|
2a 86 48 86 f7 0d 01 01 01\
|
|
05 00 #parameters = NULL\
|
|
04 82 01 3a #privateKey = RSAPrivateKey encoding\
|
|
30 82 01 36\
|
|
02 01 00 #version = 0\
|
|
02 40 #modulus = n\
|
|
0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\
|
|
c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\
|
|
d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\
|
|
01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\
|
|
02 03 01 00 01 #publicExponent = e\
|
|
02 40 #privateExponent = d\
|
|
01 23 c5 b6 1b a3 6e db 1d 36 79 90 41 99 a8 9e\
|
|
a8 0c 09 b9 12 2e 14 00 c0 9a dc f7 78 46 76 d0\
|
|
1d 23 35 6a 7d 44 d6 bd 8b d5 0e 94 bf c7 23 fa\
|
|
87 d8 86 2b 75 17 76 91 c1 1d 75 76 92 df 88 81\
|
|
02 20 #prime1 = p\
|
|
33 d4 84 45 c8 59 e5 23 40 de 70 4b cd da 06 5f\
|
|
bb 40 58 d7 40 bd 1d 67 d2 9e 9c 14 6c 11 cf 61\
|
|
02 20 #prime2 = q\
|
|
33 5e 84 08 86 6b 0f d3 8d c7 00 2d 3f 97 2c 67\
|
|
38 9a 65 d5 d8 30 65 66 d5 c4 f2 a5 aa 52 62 8b\
|
|
02 20 #exponent1 = d mod p-1\
|
|
04 5e c9 00 71 52 53 25 d3 d4 6d b7 96 95 e9 af\
|
|
ac c4 52 39 64 36 0e 02 b1 19 ba a3 66 31 62 41\
|
|
02 20 #exponent2 = d mod q-1\
|
|
15 eb 32 73 60 c7 b6 0d 12 e5 e2 d1 6b dc d9 79\
|
|
81 d1 7f ba 6b 70 db 13 b2 0b 43 6e 24 ea da 59\
|
|
02 20 #coefficient = q-1 mod p\
|
|
2c a6 36 6d 72 78 1d fa 24 d3 4a 9a 24 cb c2 ae\
|
|
92 7a 99 58 af 42 65 63 ff 63 fb 11 65 8a 46 1d
|
|
PublicKey: \
|
|
30 5b #subjectPublicKeyInfo\
|
|
30 0d #algorithm\
|
|
06 09 #algorithm = rsaEncryption\
|
|
2a 86 48 86 f7 0d 01 01 01\
|
|
05 00 #parameters = NULL\
|
|
03 4a #subjectPublicKey = RSAPublicKey encoding\
|
|
00\
|
|
30 47\
|
|
02 40 #modulus = n\
|
|
0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\
|
|
c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\
|
|
d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\
|
|
01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\
|
|
02 03 01 00 01 #publicExponent = e
|
|
Test: KeyPairValidAndConsistent
|
|
Message: # "Everyone gets Friday off."\
|
|
45 76 65 72 79 6f 6e 65 20 67 65 74 73 20 46 72 69 64 61 79 20 6f 66 66 2e
|
|
Signature: \
|
|
05fa6a812fc7df8bf4f2542509e03e84\
|
|
6e11b9c620be2009efb440efbcc66921\
|
|
6994ac04f341b57d05202d428fb2a27b\
|
|
5c77dfd9b15bfc3d559353503410c1e1
|
|
Test: Verify
|
|
Name: RSA/PKCS1-1.5(SHA-1)
|
|
Source: generated by Wei Dai using Crypto++ 5.0
|
|
Signature: 0610761F95FFD1B8F29DA34212947EC2AA0E358866A722F03CC3C41487ADC604A48FF54F5C6BEDB9FB7BD59F82D6E55D8F3174BA361B2214B2D74E8825E04E81
|
|
Test: Verify
|
|
Message: 00
|
|
Test: NotVerify
|
|
|
|
AlgorithmType: Signature
|
|
Name: RSA/PKCS1-1.5(SHA-1)
|
|
Source: http://islab.oregonstate.edu/emails/pkcs-tng-02/0152
|
|
KeyFormat: Component
|
|
Modulus: A885B6F851A8079AB8A281DB0297148511EE0D8C07C0D4AE6D6FED461488E0D41E3FF8F281B06A3240B5007A5C2AB4FB6BE8AF88F119DB998368DDDC9710ABED
|
|
PublicExponent: 010001
|
|
PrivateExponent: 2B259D2CA3DF851EE891F6F4678BDDFD9A131C95D3305C63D2723B4A5B9C960F5EC8BB7DCDDBEBD8B6A38767D64AD451E9383E0891E4EE7506100481F2B49323
|
|
Prime1: D7103CD676E39824E2BE50B8E6533FE7CB7484348E283802AD2B8D00C80D19DF
|
|
Prime2: C89996DC169CEB3F227958275968804D4BE9FC4012C3219662F1A438C9950BB3
|
|
ModPrime1PrivateExponent: 5D8EA4C8AF83A70634D5920C3DB66D908AC3AF57A597FD75BC9BBB856181C185
|
|
ModPrime2PrivateExponent: C598E54DAEC8ABC1E907769A6C2BD01653ED0C9960E1EDB7E186FDA922883A99
|
|
MultiplicativeInverseOfPrime2ModPrime1: 7C6F27B5B51B78AD80FB36E700990CF307866F2943124CBD93D97C137794C104
|
|
Test: KeyPairValidAndConsistent
|
|
Source: generated by Wei Dai using Crypto++ 5.0
|
|
Message: 74657374 # "test"
|
|
Signature: A7E00CE4391F914D82158D9B732759808E25A1C6383FE87A5199157650D4296CF612E9FF809E686A0AF328238306E79965F6D0138138829D9A1A22764306F6CE
|
|
Test: Verify
|