Paper 3, Section II, G

Coding and Cryptography
Part II, 2012

Describe the RSA system with public key (N,e)(N, e) and private key dd. Give a simple example of how the system is vulnerable to a homomorphism attack. Explain how a signature system prevents such an attack.