SlideShare a Scribd company logo
1 of 10
Download to read offline
Cyclic Group
a cyclic group is a group that is generated by a single element. That is, it is a
set of invertible elements with a single associative binary operation, and it contains
an element g (generator) such that every other element of the group may be obtained
by repeatedly applying the group operation to g or its inverse. Each element can be
written as a power of g in multiplicative notation, or as a multiple of g in additive
notation.
Primitive Root
 A number α is a primitive root mod p if every number coprime to p is congruent to a power of
α mod p
 α is said to be a primitive root of prime number p if :
α0 mod p , α1mod p , α2 mod p, …., αp-1 mod p are distinct (Equally distributed)
 Example: is 2 a primitive root of the prime number 5 ?
21 mod p = 2 , 22mod p = 4 , 23 mod p= 3 , 25-1 mod p = 1
 Example: is 3 a primitive root of the prime number 7 ?
The Discrete Logarithm Problem
 Consider α ε G, having order n.
< α > ={αi : 0 ≤ i ≤ n-1} is a cyclic sub-group of G having order n.
 Discrete Logarithm
 Multiplicative group (G, .), an element α ε G having order n, and an element β ε < α > .
 Find the unique integer a, 0 ≤ a ≤ n-1 such that αa = β
 We will denote this integer a by logα β ; it is called the discrete logarithm of 𝛃
The Discrete Logarithm Problem cont.
 To understand the discrete logarithm problem, let’s try to solve a simple equation:
5x mod 17 ≡ ?
If x is given , It’s Easy to compute the above equation One way function
 However, much harder time to solve the following equation:
5y mod 17 ≡ 12
If y is unknown. It’s hard to find y if x =12 is given
Example of Discrete Logarithm Problem
Suppose p =17 is an odd prime , then the message representation Zp ={0,1,…,p-1} is a finite
field , here Zp* = {1,2,…,16}, also given α =3 is a generator of Zp* , where Zp* is the set of
integers which are relatively prime to p ,i.e. , Zp* ={α º mod p, α ¹ mod p, …, αn-1 mod p}.
Then:- Zp*= { 30, 31, 32, 33, 34, 35, 36, 37,38,39,310,………,315 }
Zp*= {1, 3, 9, 10, 13, 5, 15, 11, 16,14, 8,7, 4 , 12 ,2 ,6 } Note 316 mod 17 =1.
You have to notice that , Given any a , compute b ≡ αa mod p is easy , for example given a =
10, b ≡ 3¹º mod 17 = 8 , given any b, finding an a such that b ≡ α a mod p is difficult , for
example given b=14, what is a ?? , By searching the table, a = 9. The problem is, when p is
large, the table becomes very large.
ElGamal Cryptosystem
 ElGamal is a public-key cryptosystem, which uses randomization. so that independent
encryptions of the same plain-text give different cipher-texts.
 Blocks of input text are considered as numbers.
 Encryption and Decryption are done by performing arithmetic on these numbers.
 ElGammal cryptosystem is depends on discrete logarithmic problem assumption to
guarantee security. This assumption claims that it is hard in some groups to find x
given: gx mod n and x is easy to compute given : log (gx) mod n
ElGamal Cryptosystem - Key Generation
Participant A : generates the public/private key pair
1. Generate large prime p and generator α of the multiplicative Group Zp
∗ of the
integers modulo p.
2. Select a random integer a, 1 ≤ a ≤ p − 2, and compute β ≡ αa mod p.
3. A’s Public key is (p, α, β); A’s Private key is a.
ElGamal Cryptosystem - Encryption Procedure
Participant B encrypts a message m to A
1. Obtain A’s authentic public key (p, α, β).
2. Represent the message as integers m in the range {0, 1, . . . , p − 1}.
3. Select a random integer k, 1 ≤ k ≤ p − 2.
4. Compute γ = αk mod p and δ = m ∗ (β)k.
5. Send ciphertext c = (γ, δ) to A
Note that for each plaintext, there are p-1 possible ciphertexts
ElGamal Cryptosystem - Decryption Procedure
ParticipantA receives encrypted message m from B
1. Use private key a can compute βk by raising αk → (γ) to a
2. Recover m by computing (γ−a) ∗ δ mod p.
Note: dividing δ with βk
Example
ParticipantA: p=2579, α = 2 (primitive element of Zp*)
a = 765 (secret value)
β = 2765 mod 2579 = 949.
Participant B: wishes to send m=1299 to A.
B randomly chooses k=853.
Compute γ = 2853 mod 2579 = 435 and δ =1299(949853)mod 2579=2396
B sends C = (435,2396)
Participant A: computes m =2396 (435765)-1 mod 2579=1299.

More Related Content

Similar to lecture10.pdf

DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxvaishnavi339314
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2Coleman Gorham
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiouvafopoulos
 
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to MatchingsMaximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchingssagark4
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptRMDAcademicCoordinat
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptsomeyamohsen2
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptGayathriSanthosh11
 
ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppttahirnaquash2
 
A Level Set Method For Multiobjective Combinatorial Optimization Application...
A Level Set Method For Multiobjective Combinatorial Optimization  Application...A Level Set Method For Multiobjective Combinatorial Optimization  Application...
A Level Set Method For Multiobjective Combinatorial Optimization Application...Scott Faria
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docxpinstechwork
 
A Parallel Branch And Bound Algorithm For The Quadratic Assignment Problem
A Parallel Branch And Bound Algorithm For The Quadratic Assignment ProblemA Parallel Branch And Bound Algorithm For The Quadratic Assignment Problem
A Parallel Branch And Bound Algorithm For The Quadratic Assignment ProblemMary Calkins
 
NumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptNumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptIshwariKhanal
 

Similar to lecture10.pdf (20)

Unit 3.ppt
Unit 3.pptUnit 3.ppt
Unit 3.ppt
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
 
Ch04
Ch04Ch04
Ch04
 
DISCRETE LOGARITHMS.pdf
DISCRETE LOGARITHMS.pdfDISCRETE LOGARITHMS.pdf
DISCRETE LOGARITHMS.pdf
 
P10co982 (2)
P10co982 (2)P10co982 (2)
P10co982 (2)
 
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to MatchingsMaximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.ppt
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.ppt
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.ppt
 
ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
 
Daa notes 2
Daa notes 2Daa notes 2
Daa notes 2
 
A Level Set Method For Multiobjective Combinatorial Optimization Application...
A Level Set Method For Multiobjective Combinatorial Optimization  Application...A Level Set Method For Multiobjective Combinatorial Optimization  Application...
A Level Set Method For Multiobjective Combinatorial Optimization Application...
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Unit 3
Unit 3Unit 3
Unit 3
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
 
A Parallel Branch And Bound Algorithm For The Quadratic Assignment Problem
A Parallel Branch And Bound Algorithm For The Quadratic Assignment ProblemA Parallel Branch And Bound Algorithm For The Quadratic Assignment Problem
A Parallel Branch And Bound Algorithm For The Quadratic Assignment Problem
 
NumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptNumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.ppt
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

lecture10.pdf

  • 1. Cyclic Group a cyclic group is a group that is generated by a single element. That is, it is a set of invertible elements with a single associative binary operation, and it contains an element g (generator) such that every other element of the group may be obtained by repeatedly applying the group operation to g or its inverse. Each element can be written as a power of g in multiplicative notation, or as a multiple of g in additive notation.
  • 2. Primitive Root  A number α is a primitive root mod p if every number coprime to p is congruent to a power of α mod p  α is said to be a primitive root of prime number p if : α0 mod p , α1mod p , α2 mod p, …., αp-1 mod p are distinct (Equally distributed)  Example: is 2 a primitive root of the prime number 5 ? 21 mod p = 2 , 22mod p = 4 , 23 mod p= 3 , 25-1 mod p = 1  Example: is 3 a primitive root of the prime number 7 ?
  • 3. The Discrete Logarithm Problem  Consider α ε G, having order n. < α > ={αi : 0 ≤ i ≤ n-1} is a cyclic sub-group of G having order n.  Discrete Logarithm  Multiplicative group (G, .), an element α ε G having order n, and an element β ε < α > .  Find the unique integer a, 0 ≤ a ≤ n-1 such that αa = β  We will denote this integer a by logα β ; it is called the discrete logarithm of 𝛃
  • 4. The Discrete Logarithm Problem cont.  To understand the discrete logarithm problem, let’s try to solve a simple equation: 5x mod 17 ≡ ? If x is given , It’s Easy to compute the above equation One way function  However, much harder time to solve the following equation: 5y mod 17 ≡ 12 If y is unknown. It’s hard to find y if x =12 is given
  • 5. Example of Discrete Logarithm Problem Suppose p =17 is an odd prime , then the message representation Zp ={0,1,…,p-1} is a finite field , here Zp* = {1,2,…,16}, also given α =3 is a generator of Zp* , where Zp* is the set of integers which are relatively prime to p ,i.e. , Zp* ={α º mod p, α ¹ mod p, …, αn-1 mod p}. Then:- Zp*= { 30, 31, 32, 33, 34, 35, 36, 37,38,39,310,………,315 } Zp*= {1, 3, 9, 10, 13, 5, 15, 11, 16,14, 8,7, 4 , 12 ,2 ,6 } Note 316 mod 17 =1. You have to notice that , Given any a , compute b ≡ αa mod p is easy , for example given a = 10, b ≡ 3¹º mod 17 = 8 , given any b, finding an a such that b ≡ α a mod p is difficult , for example given b=14, what is a ?? , By searching the table, a = 9. The problem is, when p is large, the table becomes very large.
  • 6. ElGamal Cryptosystem  ElGamal is a public-key cryptosystem, which uses randomization. so that independent encryptions of the same plain-text give different cipher-texts.  Blocks of input text are considered as numbers.  Encryption and Decryption are done by performing arithmetic on these numbers.  ElGammal cryptosystem is depends on discrete logarithmic problem assumption to guarantee security. This assumption claims that it is hard in some groups to find x given: gx mod n and x is easy to compute given : log (gx) mod n
  • 7. ElGamal Cryptosystem - Key Generation Participant A : generates the public/private key pair 1. Generate large prime p and generator α of the multiplicative Group Zp ∗ of the integers modulo p. 2. Select a random integer a, 1 ≤ a ≤ p − 2, and compute β ≡ αa mod p. 3. A’s Public key is (p, α, β); A’s Private key is a.
  • 8. ElGamal Cryptosystem - Encryption Procedure Participant B encrypts a message m to A 1. Obtain A’s authentic public key (p, α, β). 2. Represent the message as integers m in the range {0, 1, . . . , p − 1}. 3. Select a random integer k, 1 ≤ k ≤ p − 2. 4. Compute γ = αk mod p and δ = m ∗ (β)k. 5. Send ciphertext c = (γ, δ) to A Note that for each plaintext, there are p-1 possible ciphertexts
  • 9. ElGamal Cryptosystem - Decryption Procedure ParticipantA receives encrypted message m from B 1. Use private key a can compute βk by raising αk → (γ) to a 2. Recover m by computing (γ−a) ∗ δ mod p. Note: dividing δ with βk
  • 10. Example ParticipantA: p=2579, α = 2 (primitive element of Zp*) a = 765 (secret value) β = 2765 mod 2579 = 949. Participant B: wishes to send m=1299 to A. B randomly chooses k=853. Compute γ = 2853 mod 2579 = 435 and δ =1299(949853)mod 2579=2396 B sends C = (435,2396) Participant A: computes m =2396 (435765)-1 mod 2579=1299.