Professional Documents
Culture Documents
Chapter 11
Chapter 11
11.1 Cryptosystem
Remarks:
Published in 1985.
Based on the DL problem in Zp or GF2k .
Protocol:
Alice choose private key kprA = aA compute kpubA = aA mod p = bA Bob choose private key kprB = aB compute kpubB = aB mod p = bB
bA ,! bB , y ,!
105
ElGamal: Set-up:
1. Choose large prime p.
2. Choose primitive element 2 Zp .
mod p.
Encryption:
1. Choose k 2 f2; 3; : : : ; p , 2g. 2. Y1 =
k
mod p.
k
3. Y2 = x
mod p.
Decryption:
x = dkpr Y1 ; Y2 = Y2 Y1a ,1 mod p:
106
107
Remarks:
ElGamal is essentially an extension of the D-H key exchange protocol.
Y2 = x1 Y3 = x2 k
k
Thus for every message block xi choose a new k! Message expansion factor . of y bits = 2dlog 2py e = 2 of x bits dlog 2pxe
9 = ; if x1 is known,
= 1q br mod p = br mod p
e = r mod p , 1
108
The above derivation can be used for decryption: Y1a,1 = Y1,a = Y1,a mod p,1 mod p = Y1p,1,a mod p
109