2.I.4GCoding and CryptographyPart II, 2007Briefly explain how and why a signature scheme is used. Describe the El Gamal scheme.