13.6 Exercises
Show that if someone discovers the value of used in the ElGamal signature scheme, then can also be determined if is small.
Alice signs the hash of a message. Suppose her hash function satisfies and for all . Suppose is a valid signed message from Alice. Give another message for which the same signature is also valid.
Alice says that she is willing to sign a petition to save koala bears. Alice’s signing algorithm uses a hash function that has an output of 60 bits (and she signs the hash of the document). Describe how Eve can trick Alice into signing a statement allowing Eve unlimited withdrawals from Alice’s bank account.
Alice uses RSA signatures (without a hash function).
Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.