Is there a way to change the public key so that decryption can still be done using the private key after some changes?

In an asymmetric encryption scheme, I was wondering if the following could be achieved:

  • Bob sends Alice his public key
  • Alice changes Bob's public key and encrypts a document with him
  • Alice sends Bob's encrypted document
  • Bob receives the document, but cannot decrypt it with his private key
  • Alice later sends additional information (possibly related to the method she used to change Bob's public key) for Bob
  • Bob uses this additional information to change his private key and successfully decrypt the document.

Is anyone

I assume RSA for key generation, encryption and decryption, but if it is easier to do with another scheme, feel free to comment.

+3
source share
4 answers

(I suppose you're talking about RSA.)

Yes, perhaps, but not 100% .

The public key is part of the private key. It contains the module and key record.

You can completely forget about changing the module because you have to generate a new rsa key pair, which is the same problem as the problem we are trying to solve.

. () 1 hope, . , . , , , (!).

, 100% - , , .

+2

, .

, (e,d,n) RSA. RSA RSA n:

, p, 1 256- .

m, e*p :

c= m^{e*p} mod n.

, p, ,

(1) P = p^{-1} mod phi(n)

(2) m^e=c^{P} mod n

m=(m^e)^d mod n. , phi (n).

, ? - , ?

+2

, RSA , AES. AES , AES , AES . .

, AES, AES, , . , ( RSA).

+1

, .

RSA, ?

FYI, RSA . ( , AES).

, , .

(), , . ; - ( , RSA ), , , ( ).

In fact, I'm not sure that you took care of this. This is a pretty useless thing. Perhaps, however, you are really interested in Key Separation (or Secret Access, as Wikipedia seems to be causing).

NTN. I am by no means an expert.

0
source

Source: https://habr.com/ru/post/1735002/


All Articles