5 Let S Assume Alice S Public Key N 15 E 3 Private Key N 15 D 3 Bob Sends Message M 5 Enc Q37034468

5. Lets assume, Alices public key is (N-15, e-3), private key is (N-15, d-3). Bob sends message m-5 by encrypting it with A

5. Let’s assume, Alice’s public key is (N-15, e-3), private key is (N-15, d-3). Bob sends message m-5 by encrypting it with Alice’s public key. Attacker Eve intercepts that ciphertext c and sends an innocent request to Alice to sign it using Alice’s private key without telling Alice that it was in fact a ciphertext. Without knowing, Alice signs it. Explain what Eve has achieved. Will it happen for public key is (N-33, e-3),

OR
OR

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.