Digital Signatures

Prev: Integer Factorization and RSA Next: Combinatorics Probability and Information Theory

Exercises

Section 4.2. RSA Digital Signatures

4.1

Samantha uses the RSA signature scheme with primes and and public verification exponent .

(a) What is Samantha’s public modulus? What is her private signing key?

(b) Samantha signs the digital document . What is the signature?

4.2

Samantha uses the RSA signature scheme with public modulus and public verification exponent . Adam claims that Samantha has signed each of the documents

and that the associated signatures are

Which of these are valid signatures?

4.3

Samantha uses the RSA signature scheme with public modulus and public verification exponent

Use whatever method you want to factor , and then forge Samantha’s signature on the document .

4.4

Suppose that Alice and Bob communicate using the RSA PKC. This means that Alice has a public modulus , a public encryption exponent , and a private decryption exponent , where and are primes and and satisfy

Similarly, Bob has a public modulus , a public encryption exponent , and a private decryption exponent .

In this situation, Alice can simultaneously encrypt and sign a message in the following way. Alice chooses her plaintext and computes the usual RSA ciphertext

She next applies a hash function to her plaintext and uses her private decryption key to compute

She sends the pair to Bob.

Bob first decrypts the ciphertext using his private decryption exponent ,

He then uses Alice’s public encryption exponent to verify that

Explain why verification works, and why it would be difficult for anyone other than Alice to send Bob a validly signed message.

Section 4.3. Discrete Logarithm Digital Signatures

4.5

Samantha uses the Elgamal signature scheme with prime and primitive root .

(a) Samantha’s private signing key is . What is her public verification key?

(b) Samantha signs the digital document using the random element . What is the signature?

4.6

Samantha uses the Elgamal signature scheme with prime and primitive root . Her public verification key is . Adam claims that Samantha has signed each of the documents

and that the associated signatures are

Which of these are valid signatures?

4.7

Let be a prime, let and be integers with , and let be arbitrary. Set

Prove that is a valid Elgamal signature on the document for the verification key . Thus Eve can produce signatures on random documents.

4.8

Suppose that Samantha is using the Elgamal signature scheme and that she is careless and uses the same random element to sign two documents and .

(a) Explain how Eve can tell at a glance whether Samantha has made this mistake.

(b) If the signature on is and the signature on is , explain how Eve can recover , Samantha’s private signing key.

(c) Apply your method from (b) to the following example and recover Samantha’s signing key , where Samantha is using the prime , base , and verification key .

4.9

Samantha uses DSA with public parameters . She chooses the secret signing key .

(a) What is Samantha’s public verification key?

(b) Samantha signs the document using the random element . What is the signature?

4.10

Samantha uses DSA with public parameters . Her public verification key is .

(a) Is a valid signature on the document ?

(b) Is a valid signature on the document ?

4.11

Samantha’s DSA public parameters are , and her public verification key is . Use whatever method you prefer (brute-force, collision, index calculus, …) to solve the DLP and find Samantha’s private signing key. Use her key to sign the document using the random element .