Digital signatures, continued.Consider the signature scheme of Exercise 1.45.

(a) Signing involves decryption, and is therefore risky. Show that if Bob agrees to sign anything he is asked to, Eve can take advantage of this and decrypt any message sent by Alice to Bob.

(b) Suppose that Bob is more careful, and refuses to sign messages if their signatures look suspiciously like text. (We assume that a randomly chosen messagethat is, a random number in the range{1,...,N-1} is very unlikely to look like text.) Describe a way in which Eve can nevertheless still decrypt messages from Alice to Bob, by getting Bob to sign messages whose signatures look random.

Short Answer

Expert verified

a) The encryption and decryption of the message are secured by using a digital signature.

b) The procedure for decryption is developed in such a way that Eve cannot access the message of Alice and Bob.

Step by step solution

01

Explain digital signature

The public-key cryptosystem allows sending messages between Alice and Bob.The third-party Eve tries to access the message using some calculations on the hash function.The digital locking of the keys provides security to the communication.The security is implemented using RSA digital signature methods.

02

To show that the encryption and decryption of the message are secured by using a digital signature

(a)

Using the RSA algorithm, Alice sends the encrypted messageE=MemodNto Bob.

During decryption, when Eve tries to intercept the message, then Alice asks Bob that to just sign in using his private key to get the messageM=(Me)dmodN.

This process of RSA encryption is ensured by a digital signature certificate.The Certificate Authority (CA) prevents Eve from accessing the key pair of Alice.The CA claims that it is Bob’s public key.

Suppose, Eve tries to send a message with the sign of Bob, Alice checks the validated public key of Bob and compares the hash result.

Then it fails the decryption. Thus, it will not work for Eve.

Therefore, the encryption and decryption of the message are secured by using a digital signature.

03

To show that Eve cannot access message

(b).

The correctness of the RSA algorithm is used for implementing the decryption procedure.By using the procedure, the access of Bob’s key by Eve does not work.A locking key pair is generated.So that, Eve cannot tamper with the message.

Decryption procedure:

The decryption procedure for the message that Eve does not get access to the key by using a random number is as follows.

  • Choose two random prime numbersr,s.
  • Calculaten=r×s.
  • Calculate(n)=(r1)×(s1).
  • Choose a numbersuch as1<e<(n).
  • The number eis co-prime to(n).
  • Calculategcd(e,(n))=1.
  • Calculate the keydsuch thatd.e1mod(n).
  • Public key is taken aseand the private key is taken asd.

By using the above procedure, the public and private key pairs are generated.The public key of Alice is known to Bob and vice versa.

Thus, Eve cannot access the message from Alice to Bob.

Therefore, the procedure for decryption is developed in such a way that Eve cannot access the message of Alice and Bob.

Unlock Step-by-Step Solutions & Ace Your Exams!

  • Full Textbook Solutions

    Get detailed explanations and key concepts

  • Unlimited Al creation

    Al flashcards, explanations, exams and more...

  • Ads-free access

    To over 500 millions flashcards

  • Money-back guarantee

    We refund you if you fail your exam.

Over 30 million students worldwide already upgrade their learning with Vaia!

One App. One Place for Learning.

All the tools & learning materials you need for study success - in one app.

Get started for free

Most popular questions from this chapter

Unlike a decreasing geometric series, the sum of the1,12,13,14,15,..... diverges; that is,i=1n1i=

It turns out that, for large n , the sum of the first n terms of this series can be well approximated as

i=1n1iInn+y

where is natural logarithm (log base e=2.718...) and y is a particular constant 0.57721...... Show that

i=1n1i=θ(logn)

(Hint: To show an upper bound, decrease each denominator to the next power of two. For a lower bound, increase each denominator to the next power of 2 .)

A positive integer N is a power if it is of the formqk , where q,role="math" localid="1658399000008" k are positive integers and k>1.

(a) Give an efficient algorithm that takes as input a number and determines whether it is a square, that is, whether it can be written asq2 for some positive integer q. What is the running time of your algorithm?

(b) Show that if N=qk (with role="math" localid="1658399171717" N,q , andk all positive integers), then either role="math" localid="1658399158890" klogNorN=1.

(c) Give an efficient algorithm for determining whether a positive integerN is a power. Analyze its running time.

Suppose that instead of using a compositeN=pqin the RSA cryptosystem (Figure 1.9), we simply use a prime modulus p . As in RSA, we would have an encryption exponent e, and the encryption of a message mmodpwould be memodp.Prove that this new cryptosystem is not secure, by giving an efficient algorithm to decrypt: that is, an algorithm that given and p,e,andmemodp as input, computes . Justify the correctness and analyze the running time of your decryption algorithm.

Show that if xis a nontrivial square root of 1 modulo N , that is if x21modNbut x±1modN, thenN must be composite. (For instance,421mod15but4±1mod15; thus 4 is a nontrivial square root of 1 modulo 15.)

Starting from the definition of xymodN(namely, that Ndivides x-y), justify the substitution rule xx'modN,yy'modNx+yx'+y'modN,and also the corresponding rule for multiplication.

See all solutions

Recommended explanations on Computer Science Textbooks

View all explanations

What do you think about this solution?

We value your feedback to improve our textbook solutions.

Study anywhere. Anytime. Across all devices.

Sign-up for free