Question: 2. This problem illustrates a simple application of the CCA attack. Bob intercepts a ciphertext C intended for Alice and encrypted with Alices public key
2. This problem illustrates a simple application of the CCA attack. Bob intercepts a ciphertext C intended for Alice and encrypted with Alices public key e. Bob wants to obtain the original message M = Cd mod n. Bob chooses a random value r less than n and computes:
Z = re mod n
X = ZC mod n
t = r-1 mod n
Nest Bob gets Alice to authenticate (sign) X with her private key d thereby decrypting X. Alice return Y = Xd mod n
Show how Bob can use the information now available to him to determine M.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
