<<

. 2
( 2)



Section 9.3
9.7 Mallory could intercept, decrypt to get TA and ±a , and potentially get a. However,
the second part of the key ±b is encrypted, so this provides additional security
against this weakness.


Section 9.4
9.9 If t ≡ t (mod φ(n)), then

s ≡ ceT h(IA )t ≡ (rdt )eT h(IA )t ≡ reT dt eT h(IA )t ≡
A A


reT (deT h(IA ))t ≡ reT ≡ s (mod n).
A

Since only Alice knows dA , then Bob may conclude that her signature is valid.




© 2003 by CRC Press LLC

<<

. 2
( 2)