Explaining eigamal public key cryptosystem


1) Describe Deffie Hellman key exchange with suitable example in detail.

2) Write and describe the digital signature algorithm with suitable example in detail.

3) Write down the Features of SHA-1 and MD5 algorithm.

4) What are the objectives of HMAC and it security features.

5) Users A and B use Diffie Hellman key exchange method, a common prime q=11 and a primitive root alpha=7.

(i) If user A has private key XA=3. Determine A’s public key YA?

(ii) If user B has private key XB=6. Determine B’s public key YB?

(iii) What do you mean by the shared secret key? Also write down the algorithm with suitable example.

(iv) How man in middle attack can be performed in Diffie Hellman algorithm.

6) Describe EIGamal Public key cryptosystem in detail.

(ii) Explain clearly Secure Hash Algorithm(SHA).

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Explaining eigamal public key cryptosystem
Reference No:- TGS010549

Expected delivery within 24 Hours