Elgamal Cryptographic System
1. Elgamal Cryptographic System :
In 1984, T. Elgamal announced a public Key scheme based on discrete logarithms closely related to Diffie Hellman technique. This uses in some form in a number of standards including the digital signature(DSS) and the S/MIME e-mail standard.
Global Public Elements
Key Generation by Alice
Encryption by Bob with Alice’s Public Key
Decryption by Alice with Alice’s Private Key
|
We can restate the elgamal process as follows, using above table.
1. Bob generates a random integer k.
2. Bob generates a one-time k using Alice's public key components Ya, q, and k.
3. Bob encrypts k using the public key component α, yielding C1. C1 provides sufficient information for Alice to recover k.
4. Bob encrypts the plaintext message M using k.
5. Alice recovers k from C1 using her private key.
6. Alice uses k' (here k' = inverse of k) to recover the plaintext message C2.
Thus, k function as a one-time key, used to encrypt and decrypt the message.
Comments
Post a Comment