>An RSA public key consists of a public exponent ๐ and a modulus ๐ = ๐๐ that is the product of two primes. The private key consists of the private exponent ๐ = ๐ โ1 mod ๐ (๐) and ๐ . A textbook RSA signature on a message ๐ is the value ๐ = ๐๐ mod ๐ . To verify the signature, a user checks if ๐ ๐ mod ๐ = ๐
> these attacks exploit the fact that if an error is made while computing modulo one prime, say ๐, then the resulting invalid signature ห๐ is equivalent to the correct signature modulo one prime factor ๐, but not ๐. 2.2.1 GCD attack on fully known messages. Boneh, DeMillo, and Lipton noted [11] that if an attacker had a correct signature ๐ and an incorrect signature ห๐ of this form then the attacker could compute gcd(๐, ห๐ โ ๐ ) = ๐