Gamal signature schemes

Assignment Help Computer Network Security
Reference no: EM13720421

El-­-Gamal Signature schemes works as follows:

Choose a prime number p and integers g, d < p;

Compute y = gd mod p. -­--­--­--­--­--­--­--­--­--­-- ­--­--­--­--­- (Equation 1) Public key: (y, g, p); Private key: d

To sign contract m:

* Choose k relatively prime to p-1, and not yet used

* Compute a = gk mod p -­--­--­--­--­--­--­--­--­--­--­--­--­--­--­-

(Equation 2)

* Find b such that m = (da + kb) mod p-1   -­--­--­--­--­--­--­--­--­--­--­--­--­--­--­-

(Equation 3)

The signature is (a, b).

The signature verification test is [yaab mod p = gm mod p]

To answer the following question you will need to use Fermat's little theorem ap-1= 1 mod p. You may use the following two consequence of Fermat's little theorem of [g a mod (p-1) mod p = ga mod p] and [ ab mod p-1 mod p = ab mod p].

Question: Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].

Reference no: EM13720421

Questions Cloud

Problems faced by collective bargaining : What problems faced by collective bargaining and what its causes and its solution? Link your answers with real organizations?
Explain financial incentives to promote value : What is "value" in health care and how would you design financial incentives to promote value?
Describing development of master demand schedule : Identify atleast 5 cases describing development of Master Demand Schedule or Master Production Schedule in a manufacturing or service organization.
Explore the importance of statistics in business : Explain the importance of statistics in business. What is the difference between a population and a sample? List different types of charts available in Excel.
Gamal signature schemes : Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].
Explain the government assistance for informal caregivers : Would you support government assistance for informal caregivers, through mechanisms such as tax reduction incentives, or subsidy for respite care?
Describe the traits of a networked economy : Describe the traits of a networked economy. Which trait(s) do you believe are the most significant? Why?
Find animal''s dietary requirements for each nutrient : An animal has the following dietary requirements: 20.0% CP; 1.0% Calcium; 5.0% CF; and 1,200 Kcal/lb. What percent of the animal's dietary requirements for each nutrient are being met by barley?
A small business called green coffee : A small business called Green Coffee, a small coffee shop in Boston.  Your coffee supplier, Java Distributors, is required under a written contract with you to deliver 500 pounds of coffee per week to the shop.  The deliveries are to be made each Mon..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Describe the relationship between information security

1. research the sarbanes-oxley act. write a minimum of 500 wordsthis question only cite your sources using apa 6th

  Explain the major steps needed to preserve the integrity

Analyze the overall procedures for First Responder and Incident Handling, and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.

  Which of risks gci faces are most significant to company

What measures would you propose to senior management to try to prevent a breach of data held by GCI? Your response should include recommendations for mitigating vulnerabilities identified in part (a).

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  Analyze ings solution for providing security to determine

write a three to four page paper in which youassess the probable difficulties and risks associated with using a public

  Will your file system of choice provide security

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns and explain how you would describe to the management team the difference between a compliance and a substantive audit.

  How can the trusted boot functions prevent the unauthorized

Why would IBM be an advocate for open standards? Why would it change its proprietary ESS 1.0 chip—which it had already sold in some ofits PL300 desktops and T23 ThinkPad notebooks,and which it had paid a Common Criteria Testing Laboratory to evaluate..

  What are the benefits or privacy issues

What are cookies and how do they work? What are the benefits/ privacy issues? Short answer (1 -2 paragraphs).

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

  Design a security plan that describes counter-measures

Design a security plan that describes counter-measures that will manage the threats that put the organisation's information holdings at risk and disaster recovery processes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd