Countries A and B have signed a nuclear test ban treaty. Now each wants to make sure the other doesn’t test any bombs. How, for example, is country A going to use seismic data to monitor country B? Country A wants to put sensors in B, which then send data back to A. Two problems arise.
Country A wants to be sure that Country B doesn’t modify the data.
Country B wants to look at the message before it’s sent to be sure that nothing else, such as espionage data, is being transmitted.
These seemingly contradictory requirements can be met by reversing RSA. First, A chooses to be the product of two large primes and chooses encryption and decryption exponents and . The numbers and are given to B, but , , and are kept secret. The sensor (it’s buried deep in the ground and is assumed to be tamper proof) collects the data and uses to encrypt to . Both and are sent first to country , which checks that . If so, it knows that the encrypted message corresponds to the data , and forwards the pair , to A. Country A then checks that , also. If so, A can be sure that the number has not been modified, since if is chosen, then solving for is the same as decrypting the RSA message , and this is believed to be hard to do. Of course, B could choose a number first, then let , but then would probably not be a meaningful message, so A would realize that something had been changed.
The preceding method is essentially the RSA signature scheme, which will be studied in Section 13.1.