Show that in any base b 2, the sum of any three single-digit numbers is at most two digits long
Read moreTextbook Solutions for Algorithms
Question
Digital signatures, continued. Consider the signature scheme of Exercise 1.45.(a) Signing involves decryption, and is therefore risky. Show that if Bob agrees to sign anythinghe is asked to, Eve can take advantage of this and decrypt any message sent by Alice to Bob.(b) Suppose that Bob is more careful, and refuses to sign messages if their signatures looksuspiciously like text. (We assume that a randomly chosen messagethat is, a randomnumber in the range {1, . . . , N 1}is very unlikely to look like text.) Describe a way inwhich Eve can nevertheless still decrypt messages from Alice to Bob, by getting Bob to signmessages whose signatures look random.
Solution
Step 1 of 3
a) The public-key cryptosystem allows sending messages between bob and alice. Eve is a third party which tries to access the message by using some calculations on the harsh function. In communication the security is provided by digital locking of the keys. It is implemented by using the RSA(Rivest-Shamir-Adleman)digital signature method. By using Rivest-Shamir-Adleman algorithm Bob receive encrypted message from alice means alice send message in the form of . In decryption alice asks bob that to just sign in using private-key to get the message as
. Process ensured by digital signature certificate. The certificate authority(CA) claims that it is Bob's public key and prevents Eve from accessing the key pair of alice but it will not work for Eve. Hence encryption and decryption messages are secured by using a digital signature.
full solution