13.7 Computer Problems

  1. Suppose we use the ElGamal signature scheme with p=65539, α=2, β=33384. We send two signed messages (m, r, s):

    (809, 18357, 1042) (= hi) and  (22505, 18357, 26272) (= bye).
    1. Show that the same value of k was used for each signature.

    2. Use this fact to find this value of k and to find the value of a such that βαa  (mod p).

  2. Alice and Bob have the following RSA parameters:

    nA=171024704183616109700818066925197841516671277, nB=839073542734369359260871355939062622747633109, eA=1571, eB=87697.

    Bob knows that

    pB=98763457697834568934613,  qB=8495789457893457345793

    (where nB=pBqB). Alice signs a document and sends the document and signature (m, s) (where smdA  (mod nA)) to Bob. To keep the contents of the document secret, she encrypts using Bob’s public key. Bob receives the encrypted signature pair (m1, s1)(meB, seB)  (mod nB), where

    m1=418726553997094258577980055061305150940547956s1=749142649641548101520133634736865752883277237.

    Find the message m and verify that it came from Alice. (The numbers m1, s1, nA, nB, pB, qB are stored as sigpairm1, sigpairs1, signa, signb, sigpb, sigqb in the downloadable computer files ( bit.ly/2JbcS6p).)

  3. In problem 2, suppose that Bob had primes pB=7865712896579 and qB=8495789457893457345793. Assuming the same encryption exponents, explain why Bob is unable to verify Alice’s signature when she sends him the pair (m2, s2) with

    m2=14823765232498712344512418717130930, s2=43176121628465441340112418672065063.

    What modifications need to be made for the procedure to work? (The numbers m2 and s2 are stored as sigpairm2, sigpairs2 in the downloadable computer files (bit.ly/2JbcS6p).)

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.105.124