470 likes | 601 Views
Cryptography. Public Key Cryptosystems. ElGamal Encryption: Based on Diffie Hellman Key Exchange. Security of Diffie Hellman key exchange not based on integer factoring (like RSA and Rabin) but on the discrete logarithm problem (DLP). Discrete Logarithm. Diffie Hellman Key Exchange.
E N D
ElGamal Encryption:Based on Diffie Hellman Key Exchange Security of Diffie Hellman key exchange not based on integer factoring (like RSA and Rabin)but on the discrete logarithm problem (DLP).
Diffie Hellman Key Exchange Choose order g at least 2^160 to prevent Pohlig Hellman.
SHA-1 3. The original length of x is written as a 64-bit number. 4. Append 3. to x from 2.
RSA Signatures Key Generation:
RSA Signatures Signature Generation:
RSA Signatures Signature Verification:
ElGamal Signatures Key Generation:
ElGamal Signatures Signature Generation:
ElGamal Signatures Signature Verification:
Identification • One can use for example • Passwords • Challenge-Response identification based on • symmetric encryption • public key encryption • Zero-knowledge proofs