In the spirit of Are curve secp256k1 ECDSA signatures distinguishable from random data?
Are RSA signatures distinguishable from random data?
What if you don't know the message?
What if you have many common datasets you can do analysis across?
In the spirit of Are curve secp256k1 ECDSA signatures distinguishable from random data?
Are RSA signatures distinguishable from random data?
What if you don't know the message?
What if you have many common datasets you can do analysis across?
Yes.
Is it possible to distinguish, with non-negligible advantage, an RSA signature made with a key with the modulus $n$, from a random number in the range $[1,n-1]$?
Yes for standard signature formats (PKCS#1v1.5, PSS). Given a public key $(n,e)$ and a putative signature $s$, calculate $s^e$ and convert it to an octet string following the procedure in PKCS#1. For a valid PKCS#1v1.5 signature, the string begins with a fixed prefix of length at least 11 octets, out of which all but part of the first octet are random if $s$ is random, giving a less than $2^{-80}$ probability that a random input looks like a signature. For a valid PSS signature, the string ends with a fixed octet value, and the string obtained after unmasking also has at least one fixed octet value, giving a less than $2^{-16}$ probability that a random input looks like a signature.
Is it possible to distinguish, with non-negligible advantage, an RSA signature made with an unknown key with an $N$-bit modulus from a random number in the range $[1,2^N-1]$?
Yes, with a small advantage: a valid signature is smaller than the modulus, so a putative signature $s$ can only have been produced with a modulus $n$ such that $n \gt s$.
This is mostly relevant for a slightly different question, namely: is it possible to tell, with non-negligible advantage, whether two sets of signatures are made with the same key? The answer is yes, because you can recover the modulus with non-negligible probability from a set of signatures. This means that RSA signatures do not provide privacy of the signer, which has led to practical attacks on privacy.