Blockchain gained notoriety and quickly became part of popular parlance
Ask Expert

Be Prepared For The Toughest Questions

Practice Problems

Blockchain gained notoriety and quickly became part of popular parlance

Q2. Application of Digital Signature

The working procedure of the digital signature is illustrated in Figure-2. It is recommended that you use the concept of digital signature to answer both Q2(a) and Q2(b). 

(a) Digital signature for large text message

Suppose Bob (the sender) wants to send a large text message M to Alice (the receiver). The text message M is as follows (in bold and italic face):

Blockchain gained notoriety and quickly became part of popular parlance during 2017’s unprecedented cryptocurrency boom. The technology builds on longstanding concepts and techniques in distributed transaction processing and encryption. Software developers initially brought these ideas together in a remarkably innovative manner to support Bitcoin’s 2009 launch, giving rise to the first “blockchain” network. Cryptocurrencies, many of which use the concepts Bitcoin introduced, continue to proliferate Before sending the message, Bob generates a hash h(M) of the text message M using the MD5 hash algorithm and converts h(M) into integer message m. Then, he signs the m and sends it to Alice. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification, Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses the following parameters:

1st Prime number: p = 430620674058481288123238045697123658933

2nd Prime number: q = 124566090654136987961913344431645866767

Public key parameter: e=23

In this task, you need to show how Alice generates digital signature for a large text message and Bob verifies the signature using RSA based digital signature scheme. To do this:

i. Show how Alice would generate Public and Private keys.

ii. Show how Alice would generate the digital signature for M.

iii. Show how Bob would verify the digital signature using Alice’s public-key.

iv. Do you think that RSA based digital signature can be forged? Justify why or why not.

Use the following links:

For generating MD5 hash: http://www.miraclesalad.com/webtools/md5.php

For converting hexadecimal to decimal and vice versa:

https://www.mobilefish.com/services/big_number/big_number.php

For performing large integer operations (power mod, inverse mod, LCM, GCD, Multiplication):

https://www.mobilefish.com/services/big_number_equation/big_number_equation.php ] 

(b) ElGamal based digital signature scheme

Recently, Charlie has developed a software for Alice’s Restaurant. Alice emails the payable amount (M) to her manager Bob. To ensure the integrity and authenticity, Alice generates a digital signature for the above amount with ElGamal based digital signature scheme and sends the signed message to Bob via email. Alice chooses ElGamal public key (i.e., modulus p and generator g) and private-key (i.e., secret number x). Bob chooses a random number k. The equivalent decimal numbers as follows:

M = 2300, p = 191447, g = 425, x = 1998, k = 2813

In this task, you need to show how Alice generates digital signature and Bob verifies the payable amount using ElGamal based digital signature scheme. To do this:

i. Show how Alice would generate Public and Private keys.

ii. Show how Alice would generate the digital signature for M.

iii. Show how Bob would verify the digital signature using Alice’s public-key.

iv. Does ElGamal Signature approach prevent cheating on digital signature? Justify why or why not.

Use the following links: For performing large integer operations (power mod, inverse mod, LCM, GCD, Multiplication): https://www.mobilefish.com/services/big_number_equation/big_number_equation.php ] 

Hint
ComputerA digital signature refers to a technique in mathematics that is used in validating the integrity and the authenticity of software, a digital document, or a message. In several countries, data signatures are well-thought-out to be legally binding just as traditional handwritten document signatures are....

Know the process

Students succeed in their courses by connecting and communicating with
an expert until they receive help on their questions

1
img

Submit Question

Post project within your desired price and deadline.

2
img

Tutor Is Assigned

A quality expert with the ability to solve your project will be assigned.

3
img

Receive Help

Check order history for updates. An email as a notification will be sent.

img
Unable to find what you’re looking for?

Consult our trusted tutors.

Developed by Versioning Solutions.