Question: Suppose RSA-OEAP is used, where the hash function G has a bug and outputs the all zero string. Show how an attacker can (with probability
Suppose RSA-OEAP is used, where the hash function G has a bug and outputs the all zero string.
Show how an attacker can (with probability at least 1/2) break the IND-CCA security of RSA in this case.
Step by Step Solution
3.45 Rating (155 Votes )
There are 3 Steps involved in it
The given problem involves the RSA Optimal Asymmetric Encryption Padding RSAOAEP and a specific scenario where a hash function G within the OAEP algor... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (2 attachments)
60618495aa274_55320.pdf
180 KBs PDF File
60618495aa274_55320.docx
120 KBs Word File
