dissertacao.pdf
dissertacao.pdf
dissertacao.pdf
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Therefore it is recommended that at least a fraction of 1<br />
e<br />
plain text m are randomized.<br />
3.3.2 Related Message Attack<br />
of the bits of a<br />
The attack presented in this section is considered a small public exponent attack<br />
because it is proved to work for e = 3. There is, however, some evidence that<br />
it should work also with greater exponents[22]. As this is not yet a fact, we<br />
present only the original version of the attack.<br />
Suppose Alice sends the cypher text c ∼ = m e (mod N) to Bob. Marvin,<br />
pretending to be Bob, tells Alice that he did not receive the message and requests<br />
that it will be sent again. Now Alice will slightly alter the message, say, with a<br />
different time stamp, and send it again to Bob and also to Marvin. So Marvin<br />
will have two cypher texts, corresponding to two plain texts that, though not<br />
being the same, are related by a somewhat ”simple” relation. Franklin and<br />
Reiter [47] showed that, knowing the two cypher texts and the nature of the<br />
relation between them, provided it is simple, Marvin can recover the plain text.<br />
43