L-2.11 El Gamal - DSS
L-2.11 El Gamal - DSS
L-2.11 El Gamal - DSS
We know that
For a prime number q, if α is a primitive root of q, then
α, α2, …, α q-1
are distinct (mod q).
Step-2
To sign a message M, user A first computes the hash m=H(M),
such that m is an integer in the range 0 ≤ m ≤ q-1.
1. Compute V1 = αm mod q
S1 S2
2. Compute V2 = (YA) (S1) mod q
Signature is valid if V1 = V2
Let α = 10
XA
2. Compute YA = α mod q
16
YA = 10 mod 19 = 4
0 ≤ m ≤ 18
2. Compute S1 = αK mod q
S1 = 105 mod 19 = 3
1. Compute V1 = αm mod q
V1 = 1014 mod 19 = 16
Step-2
To sign a message M, user A first computes the hash m=H(M),
such that m is an integer in the range 0 ≤ m ≤ q-1.
DSS makes use of the Secure Hash Algorithm (SHA) and presents
a new digital signature technique, the Digital Signature Algorithm
(DSA)
1. RSA Approach
Signing
References
• http://www.brainkart.com/article/Classical-Encryption-
Techniques_8339/
• https://www.tutorialspoint.com/cryptography/index.ht
m
• https://www.geeksforgeeks.org/cryptography-introducti
on/
• https://www.techopedia.com/definition/1770/cryptogr
aphy#:~:text=Cryptography%20involves%20creating%2
0written%20or,information%20to%20be%20kept%20s
ecret.&text=Information%20security%20uses%20crypto
graphy%20on,transit%20and%20while%20being%20st
ored
.
• https://www2.slideshare.net/lineking/classical-encrypti
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
E- Books Recommended
• https://www.pdfdrive.com/cyber-security-books.html
• https://bookauthority.org/books/new-cyber-security-eb
ooks
• https://bookauthority.org/books/best-cyber-security-eb
ooks
• https://www.freetechbooks.com/information-security-f5
2.html