26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

170 INTERNET SECURITY<br />

Thus, the whole ciphertext blocks ci, 1 � i � 10, are computed as:<br />

3223 3155 1012 1712 1595<br />

2653 0802 2360 0832 1369<br />

To decrypt the first ciphertext c1 = 3223, use the decryption key, d = 1019, and compute:<br />

(mod n)<br />

m1 ≡ c d 1<br />

≡ 3223 1019 (mod 3337) ≡ 914<br />

(mod n)<br />

m2 ≡ c d 2<br />

≡ 3155 1019 (mod 3337) ≡ 615<br />

.<br />

The recreated message of this example is computed as:<br />

0914 0615 1813 0120 0915<br />

1400 1905 0321 1809 2025<br />

5.2.2 RSA Signature Scheme<br />

The RSA public-key cryptosystem can be used for both encryption and signatures. Each<br />

user has three integers e, d and n, n = pq with p and q large primes. For the key pair<br />

(e, d), ed ≡ 1 (mod φ(n)) must be satisfied. If sender A wants to send signed message c<br />

corresponding to message m to receiver B, A signs it using A’s private key, computing<br />

c ≡ mdA (mod nA). First A computes<br />

ϕ(nA) ≡ lcm (pA − 1,qA − 1)<br />

where lcm stands for the least common multiple. The sender A selects his own key pair<br />

(eA,dA) such that<br />

eA •dA ≡ 1 (mod ϕ(nA))<br />

The modulus nA and the public key eA are published., Figure 5.3 illustrates the RSA<br />

signature scheme.<br />

Example 5.7 Choose p = 11 and q = 17. Thenn = pq = 187.<br />

Compute ϕ(n) = 1 cm (p − 1,q− 1)<br />

= 1 cm (10, 16) = 80<br />

Select eA = 27. TheneAdA ≡ 1 (mod ϕ(nA))<br />

27dA ≡ 1 (mod 80)<br />

dA = 3<br />

TEAMFLY<br />

Team-Fly ®

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!