RSA Signature Flashcards

1
Q

What is the biggest thread of naive RSA Signature?

A

Homomorphism. You know how this works by now…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the naive RSA Signature work?

A

It is basic RSA encryption: The sender “signs” the message by decrypting it, and then the receiver can encrypt the signatrue to verify the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does padding help secure naive RSA signature?

A

The signature of meaning ful message m can be constructed with r2 = m/r1. Such that s1* s2 = s, a valid signature of m. However, padding will make sure that (r1 padded and r2 padded) after multiplication, the padding is no longer valid. Hence padding kinda solves homomorphism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the standard approach in document signing.

A

Because siging often uses a block cipher, and documents are often quite large, signing is very time consuming. Hence, often the hash of the document is signed.
Hashes also perform over all blocks, but are way faster to compute than block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain what the thread is of a shared modulus (case 1)

A

In case 1, the attacker has the factorization of the modulus, hence it can knows p and q. Hence it can compute de private key of the other party using ed = 1 mod phi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain what the thread is of a shared modulus (case 2)

A

In case 2, the attacker does not know the factorizaiton. However, when it obtains two ciphertexts of the same message, using both of the encryption keys, it is able to use algebra to uncover the original message.

So it can decrypt the message without knowing d.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the issue with using small public component e in RSA encryption.

A

If the value is small enough, like 3 or 7, it is computationally possible to reverse the encryption using different multiple cipher text with values of N. (using CRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the advantage of using 3, 7 or 65565 as public key?

A

They are binary represented as {1}* , which leads to fast encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Altough its risks, why is it still recommended to use small e value in RSA encryption?

A

The risks are related to the naive RSA implementation. However, in practise a IND-CCA version of RSA is used. So there are no risks, and computation is faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly