An Elementary Transition to Abstract Mathematics by Effinger Gove; Mullen Gary L.;
Author:Effinger, Gove; Mullen, Gary L.;
Language: eng
Format: epub
Publisher: Taylor & Francis Group
Published: 2019-09-26T00:00:00+00:00
= 130120080009190006211429,
which she can easily translate to “MATH IS FUN!” (At which point she rolls her eyes, wondering why he bothered to encrypt such a message.)
We finish this chapter by discussing the need for authenticity as well as security in modern digital communication. In Example 20.1 Alice decrypts Bob’s message to meet him at 8, but how can she be sure that Bob sent the message? Perhaps it was the evil Eve who actually sent it and plans to trick her into giving up her decrypting exponent d when they meet. Alice would like to know that the message from Bob is authentic. Well, it turns out that RSA can also be used to establish authenticity as well as guarantee security, via what’s called a digital signature. This can be done by having as the last packet in a message a “signature” which, unlike the main part of the message, is encoded using the sender’s public modulus and private decoding exponent.
Here’s how it works. Let us now denote Alice’s public keys by nA and eA and her private decrypting key by dA. Of course Bob can also have public and private keys which we shall denote by nB, eB and dB. Now Bob wants to send the message m and his signature s to Alice. As before he uses her public modulus and encrypting exponent on the m, but for the signature part he uses his own public modulus and his private decrypting exponent. Hence Alice receives two numbers c and t, say, which are
c = meA (mod nA); t = sdB (mod nB).
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algebra | Calculus |
Combinatorics | Discrete Mathematics |
Finite Mathematics | Fractals |
Functional Analysis | Group Theory |
Logic | Number Theory |
Set Theory |
Weapons of Math Destruction by Cathy O'Neil(5038)
Factfulness: Ten Reasons We're Wrong About the World – and Why Things Are Better Than You Think by Hans Rosling(4022)
Factfulness_Ten Reasons We're Wrong About the World_and Why Things Are Better Than You Think by Hans Rosling(2754)
Descartes' Error by Antonio Damasio(2733)
A Mind For Numbers: How to Excel at Math and Science (Even If You Flunked Algebra) by Barbara Oakley(2691)
TCP IP by Todd Lammle(2641)
Applied Predictive Modeling by Max Kuhn & Kjell Johnson(2480)
Fooled by Randomness: The Hidden Role of Chance in Life and in the Markets by Nassim Nicholas Taleb(2413)
The Book of Numbers by Peter Bentley(2404)
The Tyranny of Metrics by Jerry Z. Muller(2401)
The Great Unknown by Marcus du Sautoy(2186)
Once Upon an Algorithm by Martin Erwig(2149)
Easy Algebra Step-by-Step by Sandra Luna McCune(2117)
Practical Guide To Principal Component Methods in R (Multivariate Analysis Book 2) by Alboukadel Kassambara(2093)
Lady Luck by Kristen Ashley(2073)
Police Exams Prep 2018-2019 by Kaplan Test Prep(2034)
Linear Time-Invariant Systems, Behaviors and Modules by Ulrich Oberst & Martin Scheicher & Ingrid Scheicher(1983)
All Things Reconsidered by Bill Thompson III(1960)
Secrets of Creation, Volume 1: The Mystery of the Prime Numbers by Watkins Matthew(1865)