(4) Elgamal public key cryptosystem (encryption): Start with the prime p = 13 and the primitive root g = 2. Alice sends Bob the public key A = 3. Bob wants to send the message m = 10 to Alice. Bob chooses the random element k = 3. Using the Elgamal public key cryptosystem, compute the pair of numbers (C₁, C₂) that Bob sends to Alice. Note: Do not work out how Alice computes the plaintext message m from the ciphertext (C₁, C₂).

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

All if possible

### Elgamal Public Key Cryptosystem (Encryption)

#### Example Problem:

Given:
- Prime \( p = 13 \)
- Primitive root \( g = 2 \)

**Steps:**

1. **Public Key Exchange:**
   - Alice sends Bob the public key \( A = 3 \).

2. **Message Encryption:**
   - Bob wants to send the message \( m = 10 \) to Alice.
   - Bob chooses the random element \( k = 3 \).

3. **Compute Ciphertext Pair \( (c_1, c_2) \):**

Using the Elgamal cryptosystem, Bob computes the pair \((c_1, c_2)\) to send to Alice.

**Note:** The problem requires computing the ciphertext \((c_1, c_2)\) but does not require demonstrating how Alice retrieves the plaintext message \( m \) from \((c_1, c_2)\).

To compute the ciphertext:

- Calculate \( c_1 \):
  \[
  c_1 = g^k \mod p
  \]
  Substituting the values:
  \[
  c_1 = 2^3 \mod 13 = 8
  \]

- Calculate \( c_2 \):
  \[
  c_2 = m \cdot A^k \mod p
  \]
  Substituting the values:
  \[
  c_2 = 10 \cdot 3^3 \mod 13
  \]
  First, compute \( 3^3 \mod 13 \):
  \[
  3^3 = 27 \quad \text{and} \quad 27 \mod 13 = 1
  \]
  Then:
  \[
  c_2 = 10 \cdot 1 \mod 13 = 10
  \]

Thus, the pair \((c_1, c_2)\) that Bob sends to Alice is \( (8, 10) \).
Transcribed Image Text:### Elgamal Public Key Cryptosystem (Encryption) #### Example Problem: Given: - Prime \( p = 13 \) - Primitive root \( g = 2 \) **Steps:** 1. **Public Key Exchange:** - Alice sends Bob the public key \( A = 3 \). 2. **Message Encryption:** - Bob wants to send the message \( m = 10 \) to Alice. - Bob chooses the random element \( k = 3 \). 3. **Compute Ciphertext Pair \( (c_1, c_2) \):** Using the Elgamal cryptosystem, Bob computes the pair \((c_1, c_2)\) to send to Alice. **Note:** The problem requires computing the ciphertext \((c_1, c_2)\) but does not require demonstrating how Alice retrieves the plaintext message \( m \) from \((c_1, c_2)\). To compute the ciphertext: - Calculate \( c_1 \): \[ c_1 = g^k \mod p \] Substituting the values: \[ c_1 = 2^3 \mod 13 = 8 \] - Calculate \( c_2 \): \[ c_2 = m \cdot A^k \mod p \] Substituting the values: \[ c_2 = 10 \cdot 3^3 \mod 13 \] First, compute \( 3^3 \mod 13 \): \[ 3^3 = 27 \quad \text{and} \quad 27 \mod 13 = 1 \] Then: \[ c_2 = 10 \cdot 1 \mod 13 = 10 \] Thus, the pair \((c_1, c_2)\) that Bob sends to Alice is \( (8, 10) \).
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education