Shayan MakwanaRSA approach for digital signature standardRSA (Rivest-Shamir-Adleman) is a widely used public-key cryptosystem that can be used for digital signatures. A digital signature is a…May 13, 2023May 13, 2023
Shayan MakwanaElgamal Digital Signature SchemeThe ElGamal Digital Signature Scheme is a public key cryptographic algorithm used for generating and verifying digital signatures. It is…May 13, 2023May 13, 2023
Shayan MakwanaSchnorr Digital Signature SchemeThe Schnorr Digital Signature Scheme is a public key cryptographic algorithm used for generating and verifying digital signatures. It is…May 13, 2023May 13, 2023
Shayan MakwanaHash code base digital signature.Hash-based digital signatures, also known as hash-based message authentication codes (HMAC), are a type of digital signature that uses a…May 13, 2023May 13, 2023
Shayan MakwanaThe Digital Signature Algorithm (DSA) is a widely used public-key cryptographic algorithm used for…1. Key Generation: The signer generates a pair of keys, a private key and a public key. The private key is kept secret and used for…May 13, 2023May 13, 2023
Shayan MakwanaPacket fragmentation with an example.Fragmentation is done by the network layer when the maximum size of datagram is greater than maximum size of data that can be held in a…Jan 31, 2023Jan 31, 2023