Chapter 1: Q45E (page 52)
RSA and digital signatures. Recall that in the RSA public-key cryptosystem, each user has a public key P=(N,e) and a secret key d. In a digital signature scheme, there are two algorithms, sign and verify. The sign procedure takes a message and a secret key, then outputs a signature
(a)Why would we want digital signatures?
(b) An RSA signature consists of sign,
(c) Generate your own RSA modulus, N=pq public key e, and private key d (you don’t need to use a computer). Pick p and q so you have a 4-digit modulus and work by hand. Now sign your name using the private exponent of this RSA modulus. To do this you will need to specify some one-to-one mapping from strings to integers in
(d) Alice wants to write a message that looks like it was digitally signed by Bob. She notices that Bob’s public RSA key is
Short Answer
(a) Digital Signature ensures safety of data.
(b) It is proved that digital signature make data more secure along with RSA algorithm.
(c) The implementation of RSA module is correct.
(d) The exponent must be raised by the factor of 145