这两个代码提供了相同的签名,预计:
code1:
from M2Crypto import RSA, EVP
import base64, hashlib
text = "some text"
pkey = EVP.load_key("mykey.pem") #"mykey.pem" was generated as: openssl genrsa -des3 -out mykey.pem 2048
pkey.sign_init()
pkey.sign_update(text)
signature = pkey.sign_final()
print base64.b64encode(signature)code2:
pkey = RSA.load_key("mykey.pem")
signature = pkey.sign(hashlib.sha1(text).digest())
print base64.b64encode(signature)但是,如果我想“模仿”签名算法,即用私钥加密摘要,我会得到一个不同的签名,即:
pkey = RSA.load_key("mykey.pem")
signature = pkey.private_encrypt(hashlib.sha1(text).digest(), RSA.pkcs1_padding)
print base64.b64encode(signature) #different from the two above请你解释一下好吗?后一种签署方式有什么问题?
发布于 2011-04-16 03:41:42
我认为不同之处在于,RSA_sign与摘要数据一起签署摘要PKCS1 algorithmIdentifier,其中RSA_private_encrypt只对摘要数据签名。
来自RSA手册页:
RSA_PKCS1_PADDING
PKCS #1 v1.5 padding. This function does not handle the
algorithmIdentifier specified in PKCS #1. When generating or
verifying PKCS #1 signatures, RSA_sign(3) and RSA_verify(3) should
be used.发布于 2015-01-10 19:30:34
在EVP.sign()中内部发生的事情如下(与普通的RSA.sign()不同):
sha1_hash = hashlib.sha1(MESSAGE).digest()
# Add ASN.1 SHA-1 OID prefix
sha1_asn1_prefix = '3021300906052b0e03021a05000414'.decode('hex')
asn1_hash = sha1_asn1_prefix + sha1_hash
rsa = RSA.load_key(KEY)
# Use PKCS#1 padding
signature = rsa.private_encrypt(asn1_hash, RSA.pkcs1_padding).encode('hex')但底线是,应该像上面的代码1那样使用EVP.sign() --它在内部做的是正确的事情。
https://stackoverflow.com/questions/5663084
复制相似问题