06.03.2017 Views

Mathematics for Computer Science

e9ck2Ar

e9ck2Ar

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“mcs” — 2017/3/3 — 11:21 — page 366 — #374<br />

366<br />

Chapter 9<br />

Number Theory<br />

to Bob with an un<strong>for</strong>geable signature, Alice uses RSA encryption on her message<br />

m, but instead using Bob’s public key to encrypt m, she uses her own private key<br />

to obtain a message m 1 . She then sends m 1 as her “signed” message to Bob.<br />

(a) Explain how Bob can read the original message m from Alice’s signed message<br />

m 1 . (Let .n A ; e A / be Alice’s public key and d A her private key. Assume<br />

m 2 Œ0::n A /.)<br />

(b) Briefly explain why Bob can be confident, assuming RSA is secure, that m 1<br />

came from Alice rather than some imposter.<br />

(c) Notice that not only Bob, but anyone can use Alice’s public key to reconstruct<br />

her message m from its signed version m 1 . So how can Alice send a secret signed<br />

message to Bob over public channels?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!