Signature Verification Worksheet
Purpose: Verify that the message and signature on your physical clue are authentic using simplified cryptographic signature verification.
How Digital Signatures Work
In cryptographic systems like Bitcoin:
- Signing: The sender uses their private key to create a signature for a message
- Verification: Anyone can use the sender's public key to verify the signature
- Security: The signature proves the message came from the private key holder without revealing the private key
This worksheet simulates a simplified version of RSA signature verification.
Step 1: Record Your Clue Data
Copy the information from your physical clue card into the boxes below:
Message (M):
Public Key (e, n): e = , n =
Signature (S):
Step 2: Hash the Message
Calculate H = hash(Message)
We'll use a simplified hash function: sum the ASCII values of each character in the message, then take modulo n.
Message: ____________________
Break down each character:
| Character | ASCII Value |
|---|---|
| Sum = | |
Calculate Hash:
H = _________ mod _________ =
Use an ASCII table or your phone to look up values.
Step 3: Verify the Signature
Calculate V = S^e mod n
Apply the public key operation to the signature to get the verification value.
Given values:
Signature (S) =
Public exponent (e) =
Modulus (n) =
Step-by-step calculation:
1. Calculate Se = =
2. Calculate (Se) mod n:
mod =
Verification Value (V) =
- Use a calculator for exponentiation (xy button)
- For modulo: divide the large number by n, then multiply the remainder by 1
- Example: 125 mod 11 = 125 รท 11 = 11 remainder 4, so answer is 4
Step 4: Compare and Conclude
Does H = V?
Compare your hash value (H) from Step 2 with your verification value (V) from Step 3.
H (Hash of Message) =
V (Verification Value) =
Are they equal?
โ YES - The signature is VALID
โ NO - The signature is INVALID/FORGED
Verification Result
The signature on our clue is:
Explanation:
Security Reflection Questions
Answer the following questions to demonstrate your understanding:
Question 1: Interception
What would happen if someone intercepted your encrypted message during the treasure hunt?
Question 2: Public Key Security
How does the public key help verify the signature without revealing the private key?
Question 3: Real-World Applications
Name at least two real-world applications that use digital signature verification like this:
Team Signatures
All team members who contributed to this verification:
| Name | Signature | Role in Activity |
|---|---|---|
Verification Worksheet | Submit with puzzle solution | Page 1 of 1
© Joerg Osterrieder 2025-2026. All rights reserved.