Gamal signature schemes

Assignment Help Computer Network Security
Reference no: EM13720421

El-­-Gamal Signature schemes works as follows:

Choose a prime number p and integers g, d < p;

Compute y = gd mod p. -­--­--­--­--­--­--­--­--­--­-- ­--­--­--­--­- (Equation 1) Public key: (y, g, p); Private key: d

To sign contract m:

* Choose k relatively prime to p-1, and not yet used

* Compute a = gk mod p -­--­--­--­--­--­--­--­--­--­--­--­--­--­--­-

(Equation 2)

* Find b such that m = (da + kb) mod p-1   -­--­--­--­--­--­--­--­--­--­--­--­--­--­--­-

(Equation 3)

The signature is (a, b).

The signature verification test is [yaab mod p = gm mod p]

To answer the following question you will need to use Fermat's little theorem ap-1= 1 mod p. You may use the following two consequence of Fermat's little theorem of [g a mod (p-1) mod p = ga mod p] and [ ab mod p-1 mod p = ab mod p].

Question: Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].

Reference no: EM13720421

Questions Cloud

Problems faced by collective bargaining : What problems faced by collective bargaining and what its causes and its solution? Link your answers with real organizations?
Explain financial incentives to promote value : What is "value" in health care and how would you design financial incentives to promote value?
Describing development of master demand schedule : Identify atleast 5 cases describing development of Master Demand Schedule or Master Production Schedule in a manufacturing or service organization.
Explore the importance of statistics in business : Explain the importance of statistics in business. What is the difference between a population and a sample? List different types of charts available in Excel.
Gamal signature schemes : Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].
Explain the government assistance for informal caregivers : Would you support government assistance for informal caregivers, through mechanisms such as tax reduction incentives, or subsidy for respite care?
Describe the traits of a networked economy : Describe the traits of a networked economy. Which trait(s) do you believe are the most significant? Why?
Find animal''s dietary requirements for each nutrient : An animal has the following dietary requirements: 20.0% CP; 1.0% Calcium; 5.0% CF; and 1,200 Kcal/lb. What percent of the animal's dietary requirements for each nutrient are being met by barley?
A small business called green coffee : A small business called Green Coffee, a small coffee shop in Boston.  Your coffee supplier, Java Distributors, is required under a written contract with you to deliver 500 pounds of coffee per week to the shop.  The deliveries are to be made each Mon..

Reviews

Write a Review

Computer Network Security Questions & Answers

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  What plan will you follow to assign printers to all the user

What plan will you follow to assign printers to all the users in the organization and how will you use your network administrator skills and knowledge in assigning IPs to each user?

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  What paperwork will be needed to reach eal7 certification

Essay Question:Secure software certification. Your present company (assignment#2) is at EAL4. You are the new program manager on this effort and your job is to bring your present software secure package to EAL7.

  Calculate m mod p in rsa cryptosystem

Assume that instead of using composite N = pq in RSA cryptosystem, we simply use prime modulus p. Calculate m mod p. Justify correctness and analyze running time of decryption algorithm.

  Variation of rsa encryption and decryption

Why would a variation of RSA encryption/decryption where a single prime number is used the modolus insecure? How can someone recover a message x from the encrypted value.

  Classify this vulnerability using the risos model

The time-to-expire field is set at 0.5 because the administrator believes that this field unit is minutes (and wishes to set the time to 30 seconds) However, bind expects the field to be in seconds and reads the value as 0 - meaning that no data i..

  Describe and assess impact of these devices on newspaper

Personal data assistants (PDAs), iPads, and e-Readers have the capability to wirelessly connect to online stores so that their users can purchase books, music, games,read e-Books, read the news, and perform a myriad of other tasks

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Explaining secure protocol

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  How to encrypt a message using a stream cipher

How to encrypt a message using block cipher algorithms we covered in class? What are the similarities and differences between those algorithms and How to encrypt a message using a stream cipher?

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

1 decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher.2 encrypt the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd