One can even sign an encrypted message this way.  Suppose Alice wants to send Bob an encrypted message.  Then she first encrypts with Bob's public n(B) and e(B).  Secondly, she signs the message with her n(A) and private d(A).  Since her d(A) is different from Bob's d(B), they don't cancel out.  Then Bob can "unsign" the message with Alice's public n(A) and e(A) and finally decrypt the message with his n(B) and private d(B)!

Example:

Alice

[Graphics:Images/rsaZ_gr_1.gif]

(private)

[Graphics:Images/rsaZ_gr_2.gif]
[Graphics:Images/rsaZ_gr_3.gif]

(public)

[Graphics:Images/rsaZ_gr_4.gif]

(public)

[Graphics:Images/rsaZ_gr_5.gif]

(private)

Bob

[Graphics:Images/rsaZ_gr_6.gif]

(private)

[Graphics:Images/rsaZ_gr_7.gif]
[Graphics:Images/rsaZ_gr_8.gif]

(public)

[Graphics:Images/rsaZ_gr_9.gif]
[Graphics:Images/rsaZ_gr_10.gif]
[Graphics:Images/rsaZ_gr_11.gif]

(public)

[Graphics:Images/rsaZ_gr_12.gif]
[Graphics:Images/rsaZ_gr_13.gif]
[Graphics:Images/rsaZ_gr_14.gif]

(private)

Alice encrypts the message with Bob's public information:

[Graphics:Images/rsaZ_gr_15.gif]
[Graphics:Images/rsaZ_gr_16.gif]
[Graphics:Images/rsaZ_gr_17.gif]
[Graphics:Images/rsaZ_gr_18.gif]
[Graphics:Images/rsaZ_gr_19.gif]
[Graphics:Images/rsaZ_gr_20.gif]
[Graphics:Images/rsaZ_gr_21.gif]
[Graphics:Images/rsaZ_gr_22.gif]
[Graphics:Images/rsaZ_gr_23.gif]
[Graphics:Images/rsaZ_gr_24.gif]

Alice signs the message with her private information and send the result to Bob:

[Graphics:Images/rsaZ_gr_25.gif]
[Graphics:Images/rsaZ_gr_26.gif]
[Graphics:Images/rsaZ_gr_27.gif]
[Graphics:Images/rsaZ_gr_28.gif]
[Graphics:Images/rsaZ_gr_29.gif]
[Graphics:Images/rsaZ_gr_30.gif]
[Graphics:Images/rsaZ_gr_31.gif]

Bob "unsigns" the message using Alice's public information:

[Graphics:Images/rsaZ_gr_32.gif]
[Graphics:Images/rsaZ_gr_33.gif]
[Graphics:Images/rsaZ_gr_34.gif]
[Graphics:Images/rsaZ_gr_35.gif]
[Graphics:Images/rsaZ_gr_36.gif]
[Graphics:Images/rsaZ_gr_37.gif]
[Graphics:Images/rsaZ_gr_38.gif]

and then decrypts it using his private information:

[Graphics:Images/rsaZ_gr_39.gif]
[Graphics:Images/rsaZ_gr_40.gif]
[Graphics:Images/rsaZ_gr_41.gif]
[Graphics:Images/rsaZ_gr_42.gif]
[Graphics:Images/rsaZ_gr_43.gif]
[Graphics:Images/rsaZ_gr_44.gif]
[Graphics:Images/rsaZ_gr_45.gif]
[Graphics:Images/rsaZ_gr_46.gif]
[Graphics:Images/rsaZ_gr_47.gif]
[Graphics:Images/rsaZ_gr_48.gif]

Next Section


Converted by Mathematica      February 8, 2001