Question: (A chosen ciphertext attack on RSA) Bob's public RSA key is (n, e). Alice sends Bob the ciphertext c which Eve intercepts. Eve then

(A chosen ciphertext attack on RSA) Bob's public RSA key is (n,

(A chosen ciphertext attack on RSA) Bob's public RSA key is (n, e). Alice sends Bob the ciphertext c which Eve intercepts. Eve then picks some integer r, computes c' = c. pe mod n, and asks Bob to decrypt c' for her using his private key. (a) Explain how, if Bob provides Eve with the plaintext decryption of c' she can recover the original message m. (b) Will this attack allow her to decrypt future messages to Bob which she intercepts, or will she have to repeat the attack for each message? (c) (Harder) Can Bob distinguish between a nefarious chosen ciphertext attack as in (a) and a benign request to decrypt a ciphertext that will not expose a past plaintext? Hint: consider c' c mod n. It's exceedingly unlikely that c is not invertible mod n, so you may assume that it is.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a In this chosen ciphertext attack scenario Eve intercepts the ciphertext c and computes c cre mod n She then asks Bob to decrypt d for her If Bob pro... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!