Question: The problem illustrates a simple application of the chosen ciphertext attack. Bob intercepts a ciphertext (C) intended for Alice and encrypted with Alice's public key

The problem illustrates a simple application of the chosen ciphertext attack. Bob intercepts a ciphertext \(C\) intended for Alice and encrypted with Alice's public key \(e\). Bob wants to obtain the original message \(M=C^{d} \bmod n\). Bob chooses a random value \(r\) less than \(n\) and computes

Z = r mod n X=ZC mod n -1 t=r mod n

Next, Bob gets Alice to authenticate (sign) \(X\) with her private key, thereby decrypting \(X\). Alice returns \(Y=X^{d} \bmod n\). Show how Bob can use the information now available to him to determine \(M\).

Z = r mod n X=ZC mod n -1 t=r mod n

Step by Step Solution

3.37 Rating (153 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Note that because Zre ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Cryptography And Network Security Questions!

Related Book