Skip to content

Commit

Permalink
update digital sig
Browse files Browse the repository at this point in the history
  • Loading branch information
millionhz committed Jan 28, 2024
1 parent 6247b69 commit 4926b50
Showing 1 changed file with 6 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,13 @@ The verifier obtains the signed document, along with the signer's public key.

The verifier then computes the hash of the received document and the decrypt the document signature sent along using the signers public key. If both the calculated hash and decrypted hash match, the document was not tampered with and the signer is authentic.

{{< hint warning >}}
## Existential Forgery

**RSA signatures do not provide non-mutability if the signature is applied on the *raw message* instead of the message hash**. ([ref](https://crypto.stackexchange.com/questions/12768/why-hash-the-message-before-signing-it-with-rsa#:~:text=a%20valid%20signature.-,Existential%20forgery,-If%20you%20do))

**RSA signatures do not provide non-mutability if the signature is applied on the *raw message* instead of the message hash**. This is due to the mathematical properties of modular arithmetics.
An adversary can generate its own signature/mutate the original signature and decode it using the sender's public key to create a valid (message, signature) pair. The pair can be sent to any party which will associate the mutated pair with the original sender.

{{< hint warning >}}

Non-mutability is only ensured if the signatures use hashes.

Expand Down

0 comments on commit 4926b50

Please sign in to comment.