RSA Signature Flashcards
What is the biggest thread of naive RSA Signature?
Homomorphism. You know how this works by now…
How does the naive RSA Signature work?
It is basic RSA encryption: The sender “signs” the message by decrypting it, and then the receiver can encrypt the signatrue to verify the sender.
How does padding help secure naive RSA signature?
The signature of meaning ful message m can be constructed with r2 = m/r1. Such that s1* s2 = s, a valid signature of m. However, padding will make sure that (r1 padded and r2 padded) after multiplication, the padding is no longer valid. Hence padding kinda solves homomorphism.
Explain the standard approach in document signing.
Because siging often uses a block cipher, and documents are often quite large, signing is very time consuming. Hence, often the hash of the document is signed.
Hashes also perform over all blocks, but are way faster to compute than block ciphers.
Explain what the thread is of a shared modulus (case 1)
In case 1, the attacker has the factorization of the modulus, hence it can knows p and q. Hence it can compute de private key of the other party using ed = 1 mod phi
Explain what the thread is of a shared modulus (case 2)
In case 2, the attacker does not know the factorizaiton. However, when it obtains two ciphertexts of the same message, using both of the encryption keys, it is able to use algebra to uncover the original message.
So it can decrypt the message without knowing d.
Explain the issue with using small public component e in RSA encryption.
If the value is small enough, like 3 or 7, it is computationally possible to reverse the encryption using different multiple cipher text with values of N. (using CRT)
What is the advantage of using 3, 7 or 65565 as public key?
They are binary represented as {1}* , which leads to fast encryption.
Altough its risks, why is it still recommended to use small e value in RSA encryption?
The risks are related to the naive RSA implementation. However, in practise a IND-CCA version of RSA is used. So there are no risks, and computation is faster.