Название: Cryptography, Information Theory, and Error-Correction
Автор: Aiden A. Bruen
Издательство: John Wiley & Sons Limited
Жанр: Зарубежная компьютерная литература
isbn: 9781119582403
isbn:
(In other words,
and
The signature is verified by
1 The left integer in the signature pair, namely , lies in the interval .
2 The congruence is satisfied. In other words, we check that .
If both conditions hold, then
(3.11)
This means that if
(3.12)
i.e.
which is a restatement of Eq. (3.10). So the computation carried out by
For a simple example, let
3.8 Intruder‐in‐the‐Middle Attack on the Diffie–Hellman (or Elliptic Curve) Key‐Exchange
We concentrate on the Diffie–Hellman key‐exchange. The Elliptic Curve key‐exchange discussed in Chapter 6 is very similar, the main difference being that it uses a different group.
Basically, the intruder Eve impersonates B to A and A to B. We use the notation of Section 3.7. Eve chooses an exponent