Gamal signature schemes

Assignment Help Computer Network Security
Reference no: EM13720421

El-­-Gamal Signature schemes works as follows:

Choose a prime number p and integers g, d < p;

Compute y = gd mod p. -­--­--­--­--­--­--­--­--­--­-- ­--­--­--­--­- (Equation 1) Public key: (y, g, p); Private key: d

To sign contract m:

* Choose k relatively prime to p-1, and not yet used

* Compute a = gk mod p -­--­--­--­--­--­--­--­--­--­--­--­--­--­--­-

(Equation 2)

* Find b such that m = (da + kb) mod p-1   -­--­--­--­--­--­--­--­--­--­--­--­--­--­--­-

(Equation 3)

The signature is (a, b).

The signature verification test is [yaab mod p = gm mod p]

To answer the following question you will need to use Fermat's little theorem ap-1= 1 mod p. You may use the following two consequence of Fermat's little theorem of [g a mod (p-1) mod p = ga mod p] and [ ab mod p-1 mod p = ab mod p].

Question: Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].

Reference no: EM13720421

Questions Cloud

Problems faced by collective bargaining : What problems faced by collective bargaining and what its causes and its solution? Link your answers with real organizations?
Explain financial incentives to promote value : What is "value" in health care and how would you design financial incentives to promote value?
Describing development of master demand schedule : Identify atleast 5 cases describing development of Master Demand Schedule or Master Production Schedule in a manufacturing or service organization.
Explore the importance of statistics in business : Explain the importance of statistics in business. What is the difference between a population and a sample? List different types of charts available in Excel.
Gamal signature schemes : Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].
Explain the government assistance for informal caregivers : Would you support government assistance for informal caregivers, through mechanisms such as tax reduction incentives, or subsidy for respite care?
Describe the traits of a networked economy : Describe the traits of a networked economy. Which trait(s) do you believe are the most significant? Why?
Find animal''s dietary requirements for each nutrient : An animal has the following dietary requirements: 20.0% CP; 1.0% Calcium; 5.0% CF; and 1,200 Kcal/lb. What percent of the animal's dietary requirements for each nutrient are being met by barley?
A small business called green coffee : A small business called Green Coffee, a small coffee shop in Boston.  Your coffee supplier, Java Distributors, is required under a written contract with you to deliver 500 pounds of coffee per week to the shop.  The deliveries are to be made each Mon..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Paper on physical secuirty

You will write a paper on what area you chose and why. You will explain what in this area you want to expand also why this important to the company.

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  In what aspects could the tool be improved

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?

  Question about virtue ethics

Based on virtue ethics, the right action to take in a particular situation is the action that a person with a strong moral character would take.

  Define the repository usernames and passwords

Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to configure subversion to be usable.

  Minimum contacts test

Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  Piece of code that allows a buffer

Give an example of piece of code that allows a buffer over run to occur. Assuming a program contains absolutely no buffer over runs. What other control flow-related problems may it have.

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd