Академический Документы
Профессиональный Документы
Культура Документы
Data Security 1
Introduction
El_Gamal is a public-key cryptosystem
technique
was designed by Dr. Taher Elgamal .
Data Security 2
Introduction
The encryption process requires two
modular exponentiations (extra
time).
Data Security 3
Key generation
Data Security 4
Key generation
Data Security 5
Key generation
Example :
let p = 11 and a = 2 and x = 5
calculate d = 25 mod 11 = 10
Data Security 6
Generator number
2- Find = p-1
Example 1 :
let p= 11 , a=2 ,test a is generator number
or not ?
sol:
= p-1 = 10 , factors of 10 = {2 , 5}
q1 = 2 ,q2 = 5
w1 = 210/2 mod 11 = 10 <> 1
w2 = 210/5 mod 11 = 4 <> 1
i.e a generator number .
Data Security 9
Generator number
Example 2 :
let p= 11 , a=3 ,test a is generator number
or not ?
sol:
= p-1 = 10 , factors of 10 = {2 , 5}
q1 = 2 ,q2 = 5
w1 = 310/2 mod 11 = 1== 1
w2 = 310/5 mod 11 = 9 <> 1
i.e a not generator number .
Data Security 10
Generator number
Example 3 :
let p= 41 , a=2 ,test a is generator number
or not ?
sol:
= p-1 = 40 , factors of 40 = {2 , 2 , 2, 5}
q1 = 21 = 2 ,q2 = 22 = 4,q3 = 23 = 8
q4 = 5
w1 = 240/2 mod 41 = 0.98 <> 1
w2 = 240/4 mod 41 = 40 <> 1
Data Security 11
Generator number
Data Security 12
Encryption
Data Security 13
Encryption
Data Security 14
Encryption
Data Security 15
Decryption
calculate d = 25 mod 11 = 10
Then
public key = ( 11 , 2 , 10)
private key = (5)
Data Security 17
Example
Plaintext = Age
Data Security 18
Example
Encryption (sender):
Data Security 19
Example
Data Security 20
Example
Data Security 21
Example
Data Security 22
Example
Data Security 23
End
For more information about
EL_Gamal cryptosystem please visit :
http://en.wikipedia.org/wiki/Taher_ElGamal
Data Security 24