Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates
Fantastic news! We've Found the answer you've been seeking!
Question:
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.
Related Book For
Posted Date: