Eve has given a bunch of messages to Alice for her to sign using the RSA signature scheme, which Alice does without looking at the messages and without using a one-way hash func tion. In fact, these messages are ciphertexts that Eve constructed to help her figure out Alice's RSA private key. What kind of attack is Eve using here?

What will be an ideal response?

This is a chosen-ciphertext attack.

Computer Science & Information Technology

You might also like to view...

You can use a ____ to display a list of choices from which the user can select zero choices, one choice, or more than one choice.

A. list box B. radio button group C. check box D. list

Computer Science & Information Technology

For a list size of 1000, on average, the sequential search makes about ____________________ key comparisons.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology