3.I.4JCoding and CryptographyPart II, 2005Briefly explain how and why a signature scheme is used. Describe the el Gamal scheme.