Hash function h is used and the signature

Assignment Help Basic Computer Science
Reference no: EM13162694

 

The ElGamal signature scheme presented in class is weak against Existential Forgery. Here is the basic exis-

tential forgery attack. Choose u, v such that gcd(v, p ? 1) = 1. Compute r = y^v g^u mod p and s = ?rv^?1

mod p ? 1.

(a) Prove the claim that the pair (r, s) is a valid signature on the message m = su mod p ? 1.

(b) Suppose a hash function h is used and the signature must be valid for h(m) instead of m. Explain how

this scheme protects against existential forgery

 

 

Reference no: EM13162694

Questions Cloud

We wish to process survey results : Suppose we wish to process survey results that are stored in a file. This exercise requires twoseparate programs. First, create a program that prompts the user for survey responses and outputseach response to a file
Given a 3 millisecond seek time : Given a 3 millisecond seek time for a disk drive and assuming that once you reach the starting track you will write the file as contiguous sectors, how long will it take to write a 1 megabyte file? The disk rotates at 7200 rpm and each sector hold 1 ..
User enters a negative number or a nondigit number : If the user enters a negative number or a nondigit number, throw and handle an appropriate exception and prompt the user to enter another nonnegative number.
Receiver r is conducting an auction : Assume the receiver R is conducting an auction in which two bidders each encrypt their bids using the scheme above and send them to R.
Hash function h is used and the signature : Suppose a hash function h is used and the signature must be valid for h(m) instead of m. Explain how  this scheme protects against existential forgery
Bob''s encryption company : Suppose Bob's encryption company produces two machines, A and B, both of this are supposed to be implemen- tations of RSA using the same modulus n = pq for some unknown primes p and q
Difference between cyber crimes and cyber-related crimes. : Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.
Draw a production system : Suppose that you must perform three tasks, X, Y, and Z. You can only do one task at a time, and once that task is done, you never redo it.
Reverses the characters in a character array : Write the function reverseit that reverses the characters in a character array. You must also write main that calls reverseit.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Leverage business intelligent-create meaningful information

Include how we can leverage business intelligent to create meaningful information and decision making systems to help keep cost and profits.

  Explain specific challenges of facing designer

Explain specific challenges of facing the designer, specifically with regard to limitations of hardware, software and interface design two paragraph each.

  Expert systems created-deployed in real-world applications

Expert systems have been created and deployed in many real-world applications to support decision making. Discover one recent case study or academic journal article.

  The head office of kkae

The head office of KKAE is located in Australia/Sing/India. Documents and reports must be displayed/printed in English. Grammar and spelling in all the documents and output reports follow the English version. For example, some of the foreign salutati..

  Why is it important to educate users about risks

what is a primary security risk that users should acknowledge when using macros? Why is it important to educate users of these risks once their dilemma is resolved?

  Finding content of ac and memory word at specified address

What are the content of the AC and the memory word at address 103 when the computer halts.

  Explain decrease in memory cost and push to keep data

Explain the apparent contradiction between the decrease in memory cost and the push to keep a single copy of Explain decrease in memory cost and the push via the paradigm of deduplication.

  What is the response time for jobs in observed system

We observe a closed system for 30 minutes, during which 1600 tasks are completed, from 12 terminals. Each terminal (source of tasks). What is the response time for jobs in the observed system?

  Explain significance of top management commitment

Explain the significance of top management commitment and development of standards for successful project management. Give examples to show the significance of these items based on experience on any type of project.

  Networks are fundamental

Networks  are  fundamental  to  every  aspect  of  our  society.  Designing  a  network  that  is  both  adequate  to  current  and  future  needs  is  important.

  Explain bindings which are required to determine semantics

Write simple assignment statement with one arithmetic operator in some language you know. For each component of statement, write various bindings which are needed to determine semantics.

  Algorithm to place cell phone base station along road

You wish to place cell phone base stations at certain points along road, so that every house is in four miles of one of base stations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd