26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Message<br />

m<br />

−1<br />

User A<br />

A′ private key<br />

p A<br />

d A<br />

E<br />

n A<br />

q A<br />

ASYMMETRIC PUBLIC-KEY CRYPTOSYSTEMS 171<br />

p A −1<br />

q A −1<br />

e A d A ≡ 1 (mod j(n A ))<br />

c ≡ m dA (mod n A )<br />

lcm<br />

User B<br />

A′ public key<br />

e A<br />

j(n A ) = lcm(p A − 1, q A − 1)<br />

Figure 5.3 The RSA signature scheme.<br />

Suppose m = 55. Then the signed message is<br />

c ≡ m dA (mod 187)<br />

≡ 55 3 (mod 187) ≡ 132<br />

The message will be recreated as:<br />

m ≡ c eA (mod n)<br />

≡ 132 27 (mod 187) ≡ 55<br />

Thus, the message m is accepted as authentic.<br />

D<br />

c eA ≡ m dAeA (mod nA )<br />

≡ m<br />

Next, consider a case where the message is much longer. The larger m requires more computation<br />

in signing and verification steps. Therefore, it is better to compute the message<br />

digest using a appropriate hash function, for example, the SHA-1 algorithm. Signing<br />

the message digest rather than the message often improves the efficiency of the process<br />

because the message digest is usually much smaller than the message.<br />

When the message is assumed to be m = 75 139, the message digest h of m is computed<br />

using the SHA-1 algorithm as follows:<br />

h ≡ H(m) (mod n)<br />

≡ H(75 139) (mod 187)<br />

m

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!