**

**

€3.00

Tax included

Schnorr Identification scheme.

This protocol is executed between Student Alice (You) and Mentor Bob. You must self-sign your Public key ** A=g^{x }mod p** computed for the Schnorr identification algorithm and send it to the Mentor for verification. Mentor replies You with his self-signed Public Key. Both signatures are created using Schnorr algorithm. You must verify Mentor’s signature to be aware that he is the same person that carried out Schnorr identification protocol.

System parameters for this protocol are the same as in Schnorr identification protocol and are the same for all students. They have the following values: ** p**=157718819 and

Mentor Bob Public Key is ** B**=80094402 generated using these system parameters.

Parameter values sent by Alice are included in brackets [ ] and must be entered in the corresponding input fields.

The following functions are used in the protocol:

**>> mod_exp(g,x,p)**

**>> randi(z)**

**>> H28(“D”)**

1. Find your previously saved Private and Public Keys and send [** A**] to the Mentor.

2. Mentor signed his Public Key ** B**=80094402 generated using system parameters

3. If it is OK, Mentor asks you to sign your Public Key in the same way as in step 2. Compute your signature ** S_{1}**=(

If it is not OK, follow the Mentor’s advise.

342 Items