Purdue University
Purdue e-Pubs Computer Science Technical Reports
Department of Computer Science
1982
Signature Protocols for RSA and Other Public- Key Cryptosystems Dorothy E. Denning Report Number: 81-419
Denning, Dorothy E., "Signature Protocols for RSA and Other Public- Key Cryptosystems" (1982). Computer Science Technical Reports. Paper 342. http://docs.lib.purdue.edu/cstech/342
This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact
[email protected] for additional information.
."
Signature Protccols lor RSA and Other Public-Key Cryplosyslems
1
Dorothy E. Dcnning 2 Computer Sciences Dept. Purdue UniversiLy W. Lafayelte, IN 4790? CSD-TR-419
October 1982 Revised: November 1982
Abstract. Public-key signature systems can be vulnerable to attack if the protocols for signi_ng messages allow a cryptanalyst to obtain signatures on arldr'L'ry messages of tile cryptanalysL's choice. This vulnerability is shown to ur'i;~(~ frum th0. homomorphic sLructure of public-key systems. A signature proloeol thill foils the ullack is described.
Gif Ca.i.e,gori:1R and Subject DescriploTS: E.3 [Vata]: Data Encryption - public key crYfJL(lsysLern::; .
(jwnwu'.1. TeTnJ.: :::::ecurily. Add:iHonal }wy lI'o'rds
and PhTuse~;: digital cryplcgraphic protocol, hashing, homomorphism,
signature,
1. ]ยท'ormcrly "A Note on StrcnB~hcninB RSA llnd Other Public-Key CryptosysLems",
2.
l~c:;c;jrch
suppo:1.ed in part by NSf' Grant MCSBO-l5