pdf-explicando - PDF da explicando o problema a ser desenvolvido.
-
Encryption application: The user enters a text (.txt) and a public key. The application returns an encrypted text (.txt) through the RSA encryption scheme.
-
Application of decrypt: The user enters with a text (encrypted .txt) and your private key. The application returns a decrypted text (.txt).
-
Signature application: The user enters a text (.txt) and with your private key. The application returns the the text (another .txt).
-
Signature verification application: User enters with a text (.txt), enters a signature on that text (.txt), and enter with the public key of who signed. The application returns YES (signature is valid) or NO (signature is invalid).
Let us suppose that A wants to send a message m to B, and that there is a public key (p, α), where p is a large prime number and α is a Zp generator