I already understands how to use the RSA algorithm to sign messages, as you can see in this post of mine. Searching about elliptic curves, I found a general algorithm called Digital Signing Algorithm. I can't find any intuition on that, only proofs that it works, but I'm unable to get the idea of those proofs. Is RSA a specific case of DSA? Which mathematical principles does DSA uses? Like in my post, can you develop the ideia?
2026-04-01 15:12:20.1775056340
Digital Signature Algorithm (DSA) intuition and its relation to RSA
285 Views Asked by Bumbble Comm https://math.techqa.club/user/bumbble-comm/detail At
1
There are 1 best solutions below
Related Questions in ABSTRACT-ALGEBRA
- Feel lost in the scheme of the reducibility of polynomials over $\Bbb Z$ or $\Bbb Q$
- Integral Domain and Degree of Polynomials in $R[X]$
- Fixed points of automorphisms of $\mathbb{Q}(\zeta)$
- Group with order $pq$ has subgroups of order $p$ and $q$
- A commutative ring is prime if and only if it is a domain.
- Conjugacy class formula
- Find gcd and invertible elements of a ring.
- Extending a linear action to monomials of higher degree
- polynomial remainder theorem proof, is it legit?
- $(2,1+\sqrt{-5}) \not \cong \mathbb{Z}[\sqrt{-5}]$ as $\mathbb{Z}[\sqrt{-5}]$-module
Related Questions in NUMBER-THEORY
- Maximum number of guaranteed coins to get in a "30 coins in 3 boxes" puzzle
- Interesting number theoretical game
- Show that $(x,y,z)$ is a primitive Pythagorean triple then either $x$ or $y$ is divisible by $3$.
- About polynomial value being perfect power.
- Name of Theorem for Coloring of $\{1, \dots, n\}$
- Reciprocal-totient function, in term of the totient function?
- What is the smallest integer $N>2$, such that $x^5+y^5 = N$ has a rational solution?
- Integer from base 10 to base 2
- How do I show that any natural number of this expression is a natural linear combination?
- Counting the number of solutions of the congruence $x^k\equiv h$ (mod q)
Related Questions in CRYPTOGRAPHY
- What exactly is the definition of Carmichael numbers?
- What if Eve knows the value of $S$ in digital signiture?
- Relative prime message in RSA encryption.
- Encryption with $|K| = |P| = |C| = 1$ is perfectly secure?
- Cryptocurrency Math
- DLP Relationship of primitive roots $\pmod{p}$ with $p$ and $g$
- Hints to prove $2^{(p−1)/2}$ is congruent to 1 (mod p) or p-1 (mod p)
- Period of a binary sequence
- generating function / stream cipher
- RSA, cryptography
Trending Questions
- Induction on the number of equations
- How to convince a math teacher of this simple and obvious fact?
- Find $E[XY|Y+Z=1 ]$
- Refuting the Anti-Cantor Cranks
- What are imaginary numbers?
- Determine the adjoint of $\tilde Q(x)$ for $\tilde Q(x)u:=(Qu)(x)$ where $Q:U→L^2(Ω,ℝ^d$ is a Hilbert-Schmidt operator and $U$ is a Hilbert space
- Why does this innovative method of subtraction from a third grader always work?
- How do we know that the number $1$ is not equal to the number $-1$?
- What are the Implications of having VΩ as a model for a theory?
- Defining a Galois Field based on primitive element versus polynomial?
- Can't find the relationship between two columns of numbers. Please Help
- Is computer science a branch of mathematics?
- Is there a bijection of $\mathbb{R}^n$ with itself such that the forward map is connected but the inverse is not?
- Identification of a quadrilateral as a trapezoid, rectangle, or square
- Generator of inertia group in function field extension
Popular # Hahtags
second-order-logic
numerical-methods
puzzle
logic
probability
number-theory
winding-number
real-analysis
integration
calculus
complex-analysis
sequences-and-series
proof-writing
set-theory
functions
homotopy-theory
elementary-number-theory
ordinary-differential-equations
circles
derivatives
game-theory
definite-integrals
elementary-set-theory
limits
multivariable-calculus
geometry
algebraic-number-theory
proof-verification
partial-derivative
algebra-precalculus
Popular Questions
- What is the integral of 1/x?
- How many squares actually ARE in this picture? Is this a trick question with no right answer?
- Is a matrix multiplied with its transpose something special?
- What is the difference between independent and mutually exclusive events?
- Visually stunning math concepts which are easy to explain
- taylor series of $\ln(1+x)$?
- How to tell if a set of vectors spans a space?
- Calculus question taking derivative to find horizontal tangent line
- How to determine if a function is one-to-one?
- Determine if vectors are linearly independent
- What does it mean to have a determinant equal to zero?
- Is this Batman equation for real?
- How to find perpendicular vector to another vector?
- How to find mean and median from histogram
- How many sides does a circle have?
RSA, as you know, is based on an integer modulus $n = pq$ (public), composed of two primes (secret) and a public encryption exponent $e$ and a secret decryption exponent $d$. You can both encrypt messages using $e$, and sign messages using $d$ (and verify them using $e$ again). The security is based on the fact that we cannot (in egenral) extract $e$-th roots modulo a number $n$ of the form $pq$, where $p,q$ are distinct primes. And if we could factor $n$, then we could also extract those roots, so it's (secondarily) based on the hardness of factoring such $n$.
But we also have the discrete logarithm problem, based on a (large) subgroup of all non-zero integers modulo a public prime $p$, given by a public generator $g$. Here the hard problem is that given $g^x \pmod p$, it's generally hard to find $x$ (the discrete logarithm problem DL). The Diffie-Hellman (DH) key-exchange is based on this (the exact security depends on a somewhat stronger assumption than that DL is hard, the DH assumption). Note that DH by itself is no encryption, but the basis for a key-exchange protocol, where both parties participate to compute a common secret.
Subsequent work by El-Gamal and others have used the DH idea to build a crypto system (the El-Gamal crypto-system) and a signature scheme; actual several ones: El-Gamal has one, and DSA is another, which is more common and standardised by NIST.
Of course, we can do this in any group where the DL problem is supposed to be hard, so we get elliptic curve variants as well: ECDH-El-Gamal and ECDH-DSA, which have smaller parameters, and are more efficient.
So esentially they are based on different problems and assumptions. DH is actually older but as a crypto-signature scheme RSA is.