✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
A software company uses textbook RSA digital signatures to secure its app updates. Here’s how it works:
An attacker replaces the developer’s public key with their own on the download page. When users download the same update: They compute (unchanged). They check which is incorrect (≠ 10). But the attacker provides a new signature signature' = 8 such that which matches the original hash.
Why can a user be tricked into accepting the attacker’s update?
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!