Well because first of all that's the same constant stuff like OpenSSL and every other RSA implementation uses,
and 0x10001 having a short bit-length and small Hamming weight results in more efficient encryption.
e must also be carefully chosen, it must be higher than 1 and less than the totient of N
the greatest common divisor of
e and the totient of N must also be 1.
Choosing a random
e most likely won't follow those requirements.
And also, taken from
Wikipedia
Quote
When encrypting with low encryption exponents (e.g., e = 3) and small values of the m, (i.e., m < n1/e) the result of m*e is strictly less than the modulus n. In this case, ciphertexts can be easily decrypted by taking the eth root of the ciphertext over the integers.
AES would be a better solution as long as you use my fixed version of KillaVanilla's AES
here.
But you are still stuck with the problem of sharing keys.
You could use the diffie-hellman key exchange which I also made a proof of concept
here.
but again the small numbers makes it very unsecure.
Security is hard in CC
Edited by Anavrins, 09 April 2015 - 06:24 AM.