Monday, October 8, 2012

6.2, due Wednesday October 10th

1. The most difficult part of this reading was to understand how Eve might do such a thing; must she know how p and q were chosen to rely on these methods? Also, how common is it that these attacks on RSA are even plausible? Also I didn't really understand OAEP very well or the proof of the timing attacks.

2. I think it's interesting that by using principles of continued fractions, Eve can decode a message between Alice and Bob. I also thought it was ingenius to be able to discover the d exponent by timing the computation times for a series of decryptions!

No comments:

Post a Comment