Signature Protocols for RSA and Other Public- Key ... - Semantic Scholar

33 downloads 12630 Views 340KB Size Report
Department of Computer Science. 1982. Signature Protocols for RSA and Other Public- Key. Cryptosystems. Dorothy E. Denning. Report Number: 81-419.
Purdue University

Purdue e-Pubs Computer Science Technical Reports

Department of Computer Science

1982

Signature Protocols for RSA and Other Public- Key Cryptosystems Dorothy E. Denning Report Number: 81-419

Denning, Dorothy E., "Signature Protocols for RSA and Other Public- Key Cryptosystems" (1982). Computer Science Technical Reports. Paper 342. http://docs.lib.purdue.edu/cstech/342

This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information.

."

Signature Protccols lor RSA and Other Public-Key Cryplosyslems

1

Dorothy E. Dcnning 2 Computer Sciences Dept. Purdue UniversiLy W. Lafayelte, IN 4790? CSD-TR-419

October 1982 Revised: November 1982

Abstract. Public-key signature systems can be vulnerable to attack if the protocols for signi_ng messages allow a cryptanalyst to obtain signatures on arldr'L'ry messages of tile cryptanalysL's choice. This vulnerability is shown to ur'i;~(~ frum th0. homomorphic sLructure of public-key systems. A signature proloeol thill foils the ullack is described.

Gif Ca.i.e,gori:1R and Subject DescriploTS: E.3 [Vata]: Data Encryption - public key crYfJL(lsysLern::; .

(jwnwu'.1. TeTnJ.: :::::ecurily. Add:iHonal }wy lI'o'rds

and PhTuse~;: digital cryplcgraphic protocol, hashing, homomorphism,

signature,

1. ]ยท'ormcrly "A Note on StrcnB~hcninB RSA llnd Other Public-Key CryptosysLems",

2.

l~c:;c;jrch

suppo:1.ed in part by NSf' Grant MCSBO-l5