5. Let’s assume, Alice’s public key is (N-15, e-3), private key is (N-15, d-3). Bob sends message m-5 by encrypting it with Alice’s public key. Attacker Eve intercepts that ciphertext c and sends an innocent request to Alice to sign it using Alice’s private key without telling Alice that it was in fact a ciphertext. Without knowing, Alice signs it. Explain what Eve has achieved. Will it happen for public key is (N-33, e-3),
OR
OR