Eve has given a bunch of messages to Alice for her to sign using the RSA signature scheme, which Alice does without looking at the messages and without using a one-way hash func tion. In fact, these messages are ciphertexts that Eve constructed to help her figure out Alice's RSA private key. What kind of attack is Eve using here?

What will be an ideal response?


This is a chosen-ciphertext attack.

Computer Science & Information Technology

You might also like to view...

Embedding fonts in a presentation ensures that the font will display properly on any computer

Indicate whether the statement is true or false

Computer Science & Information Technology

Case AC 2-1Ron is an IT Manager at a local grocery store and is cleaning up one of his databases.Ron found a field that he wants to delete.  He can delete a field by clicking the row selector for the field, and then clicking the Delete Rows button in the Tools group on the ____ tab.

A. Design B. File C. Home D. Create

Computer Science & Information Technology

______ is a secure version of HTTP that encrypts data sent to and from a web server

a. HTTPS b. SFTP c. L2TP d. SSH

Computer Science & Information Technology

If you are running Windows 2000, Windows XP, or Windows Vista, you can use all of the following methods to find out how much RAM is installed in your computer except

A. From the Control Panel, select System and then the Hardware tab B. Use the Performance tab under the Task Manager C. Select Properties from My Computer/Computer D. With a newer keyboard, press the WINDOWS-PAUSE/BREAK keystroke combination

Computer Science & Information Technology