A new protocol to protect RSA and asymmetric algorithms from spying
I will answer the question about whether it is possible to defend RSA against self-reverse decryption, and in general from spying method attacks, by saying that there are multiple ways to avoid these attacks depending on who performs the attack. One of the remediations to avoid these attacks is related to digital signatures (we looked at digital signatures in Chapter 4, Hash Functions and Digital Signatures). However, in the case of fake encryption and backdoors, as we have seen in the previous section, a special kind of digital signature is required to counter these attacks.
So, I invented this new protocol to guarantee the receiver will decrypt a non-manipulated cryptogram.
This protocol provides a digital signature on the cryptogram made by the transmitter.
Indeed, if Alice (receiver) requests Bob (sender) to digitally sign the cryptogram (c) with his private key [db], then Alice will be sure that no...