14.07.2013 Views

dissertacao.pdf

dissertacao.pdf

dissertacao.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Therefore it is recommended that at least a fraction of 1<br />

e<br />

plain text m are randomized.<br />

3.3.2 Related Message Attack<br />

of the bits of a<br />

The attack presented in this section is considered a small public exponent attack<br />

because it is proved to work for e = 3. There is, however, some evidence that<br />

it should work also with greater exponents[22]. As this is not yet a fact, we<br />

present only the original version of the attack.<br />

Suppose Alice sends the cypher text c ∼ = m e (mod N) to Bob. Marvin,<br />

pretending to be Bob, tells Alice that he did not receive the message and requests<br />

that it will be sent again. Now Alice will slightly alter the message, say, with a<br />

different time stamp, and send it again to Bob and also to Marvin. So Marvin<br />

will have two cypher texts, corresponding to two plain texts that, though not<br />

being the same, are related by a somewhat ”simple” relation. Franklin and<br />

Reiter [47] showed that, knowing the two cypher texts and the nature of the<br />

relation between them, provided it is simple, Marvin can recover the plain text.<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!