Question: Another approach (besides hashing) that has been explored to construct secure RSA-based signatures is to encode the message before applying the RSA permutation. Here

Another approach (besides hashing) that has been explored to construct secure RSA-based signatures is to

Another approach (besides hashing) that has been explored to construct secure RSA-based signatures is to encode the message before applying the RSA permutation. Here the signer fixes a public encoding function enc: {0,1) Z as part of its public key, and the signature on a message m is := [enc(m) mod N]. (a) How is verification performed in such a scheme? (b) Suggest an appropriate encoding function for < < ||N|| that heuris- tically prevents the "no-message attack" described in Section 13.4.1. (c) Show that encoded RSA is insecure if enc(m) = m/|0*/10 (where def def K ||N||, m 4x/5, and m is not the all-0 message). Assume e = 3. (d) Show that encoded RSA is insecure for enc(m) = m/|0||m (where def |m| (||N||-1)/2 and m is not the all-0 message). Assume e = 3. (e) Show attacks in parts (c) and (d) for arbitrary e.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Verification To verify an encoded RSA signature a verifier first decodes the signature using the signers public encoding function enc The verifier t... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!