Question

Digital Signature (5-5): In the course notes we looked at RSA for encryption and signatures (using...

Digital Signature (5-5): In the course notes we looked at RSA for encryption and signatures
(using exactly the same mathematical formula), and ElGamal for encryption. There has been
several questions on using ElGamal for signature. The ElGamal encryption algorithm cannot
be used for signatures but there are signature schemes that is based on discrete logarithm.


(a) Search for simple explanation of the ElGamal signature scheme and DSA signature
scheme (Hint: Wikipedia). Can these algorithms be used to encrypt a message? What
is the main di erence in how you verify the validity of the message with these schemes
when compared to RSA?


(b) Choose one of these schemes and do a worked example of signing a message and then
verifying the signature. You should use the following values:
ElGamal                      DSA
Private key x= 16         Private key x = 6
Base g = 7      Base g = 107
Prime p = 71             Primes p = 131 and q = 13
Random k = 9             Random k = 8
Message H(m) = 13     Message H(m) = 13

0 0
Add a comment Improve this question Transcribed image text
Answer #1

(a) The ElGamal signature scheme is a digital signature scheme based on the algebraic properties of modular exponentiation, together with the discrete logarithm problem. The algorithm uses a key pair consisting of a public key and a private key. The private key is used to generate a digital signature for a message, and such a signature can be verified by using the signer's corresponding public key. The digital signature provides message authentication (the receiver can verify the origin of the message), integrity (the receiver can verify that the message has not been modified since it was signed) and non-repudiation (the sender cannot falsely claim that they have not signed the message).

The DSA algorithm works in the framework of public-key cryptosystems and is based on the algebraic properties of modular exponentiation, together with the discrete logarithm problem, which is considered to be computationally intractable. The algorithm uses a key pair consisting of a public key and a private key. The private key is used to generate a digital signature for a message, and such a signature can be verified by using the signer's corresponding public key. The digital signature provides message authentication (the receiver can verify the origin of the message), integrity (the receiver can verify that the message has not been modified since it was signed) and non-repudiation (the sender cannot falsely claim that they have not signed the message).

These algorithms are not used to encrypt message . DSA stands for "Digital Signature Algorithm" - and is specifically designed to produce digital signatures, not perform encryption. The ElGamal cryptographic algorithm is a public key system like the Diffie-Hellman system. It is mainly used to establish common keys and not to encrypt messages.

RSA and ElGamal both use asymmetric key techniques. The fundamental difference lies in the number of variables used. RSA uses two variables during encryption while ElGamal uses three variables. The RSA algorithm's strength is at the difficulty level in factoring the numbers into a prime factor. DSA(Digital Signature Algorithm) can only be used for signing/verification, whereas RSA can be used for encryption/decrypt as well.

(b) El Gamal:

y=gxmod p=19

a=gkmod p=47

b=H(m)*ykmod p=44

decrypted msg=(b/ax) mod p=13

Add a comment
Know the answer?
Add Answer to:
Digital Signature (5-5): In the course notes we looked at RSA for encryption and signatures (using...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In ElGamal encryption scheme, assume that a prime modulus p = 451 and a generator g=288....

    In ElGamal encryption scheme, assume that a prime modulus p = 451 and a generator g=288. If the private key is 23, what is the public key? Encrypt a message m=31 with a random value k=41 and decrypt the ciphertext.

  • (8) Suppose that Samantha is using the Elgamal signature scheme and that she is careless and uses...

    (8) Suppose that Samantha is using the Elgamal signature scheme and that she is careless and uses the same random element k to sign two documents D and D (6) Explain how Evan can tell at a glance whether Samantha has made this mistake (ii) If the signature on D is (S1, S2) and the signature on D' is (St, S2), explain how Evan can recover a, Samanthas private signing key. (ii) Apply your method fr) to the following example...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT