4.4. Suppose that Alice and Bob communicate using the RSA PKC. This means that Alice has a public modulus NA = PAqA, a public encryption exponent eд, and a private decryption exponent dд, where PA and q₁ are primes and eд and dд satisfy eAdA 1 (mod (PA - 1)(A-1)). Similarly, Bob has a public modulus NB = PBqв, a public encryption expo- nent eg, and a private decryption exponent dB. In this situation, Alice can simultaneously encrypt and sign a message in the following way. Alice chooses her plaintext m and computes the usual RSA ciphertext c = mB (mod NB). She next applies a hash function to to her plaintext and uses her private decryption key to compute s = Hash (m)dA (mod N₁). She sends the pair (c, s) to Bob. Bob first decrypts the ciphertext using his private decryption exponent dB, mcdB (mod NB). = He then uses Alice's public encryption exponent eд to verify that Hash (m) SA (mod NA). Explain why verification works, and why it would be difficult for anyone other than Alice to send Bob a validly signed message.

Advanced Engineering Mathematics
10th Edition
ISBN:9780470458365
Author:Erwin Kreyszig
Publisher:Erwin Kreyszig
Chapter2: Second-order Linear Odes
Section: Chapter Questions
Problem 1RQ
icon
Related questions
Question

[Algebraic Cryptography] How do you solve this question?

4.4. Suppose that Alice and Bob communicate using the RSA PKC. This
means that Alice has a public modulus NA = PAqA, a public encryption
exponent eд, and a private decryption exponent dд, where PA and q are
primes and eд and dд satisfy
едdд = 1 (mod (pa − 1)(qa − 1)).
Similarly, Bob has a public modulus NB = PBqB, a public encryption expo-
nent eg, and a private decryption exponent dB.
In this situation, Alice can simultaneously encrypt and sign a message in
the following way. Alice chooses her plaintext m and computes the usual RSA
ciphertext
c = mB (mod NB).
She next applies a hash function to to her plaintext and uses her private
decryption key to compute
s = Hash (m)dA (mod NA).
She sends the pair (c, s) to Bob.
Bob first decrypts the ciphertext using his private decryption exponent dB,
mcdB (mod NB).
He then uses Alice's public encryption exponent eд to verify that
Hash (m) SA (mod NA).
Explain why verification works, and why it would be difficult for anyone
other than Alice to send Bob a validly signed message.
Transcribed Image Text:4.4. Suppose that Alice and Bob communicate using the RSA PKC. This means that Alice has a public modulus NA = PAqA, a public encryption exponent eд, and a private decryption exponent dд, where PA and q are primes and eд and dд satisfy едdд = 1 (mod (pa − 1)(qa − 1)). Similarly, Bob has a public modulus NB = PBqB, a public encryption expo- nent eg, and a private decryption exponent dB. In this situation, Alice can simultaneously encrypt and sign a message in the following way. Alice chooses her plaintext m and computes the usual RSA ciphertext c = mB (mod NB). She next applies a hash function to to her plaintext and uses her private decryption key to compute s = Hash (m)dA (mod NA). She sends the pair (c, s) to Bob. Bob first decrypts the ciphertext using his private decryption exponent dB, mcdB (mod NB). He then uses Alice's public encryption exponent eд to verify that Hash (m) SA (mod NA). Explain why verification works, and why it would be difficult for anyone other than Alice to send Bob a validly signed message.
Expert Solution
steps

Step by step

Solved in 3 steps with 3 images

Blurred answer
Recommended textbooks for you
Advanced Engineering Mathematics
Advanced Engineering Mathematics
Advanced Math
ISBN:
9780470458365
Author:
Erwin Kreyszig
Publisher:
Wiley, John & Sons, Incorporated
Numerical Methods for Engineers
Numerical Methods for Engineers
Advanced Math
ISBN:
9780073397924
Author:
Steven C. Chapra Dr., Raymond P. Canale
Publisher:
McGraw-Hill Education
Introductory Mathematics for Engineering Applicat…
Introductory Mathematics for Engineering Applicat…
Advanced Math
ISBN:
9781118141809
Author:
Nathan Klingbeil
Publisher:
WILEY
Mathematics For Machine Technology
Mathematics For Machine Technology
Advanced Math
ISBN:
9781337798310
Author:
Peterson, John.
Publisher:
Cengage Learning,
Basic Technical Mathematics
Basic Technical Mathematics
Advanced Math
ISBN:
9780134437705
Author:
Washington
Publisher:
PEARSON
Topology
Topology
Advanced Math
ISBN:
9780134689517
Author:
Munkres, James R.
Publisher:
Pearson,