(4) Elgamal public key cryptosystem (encryption): Start with the prime p = 13 and the primitive root g = 2. Alice sends Bob the public key A = 3. Bob wants to send the message m = 10 to Alice. Bob chooses the random element k = 3. Using the Elgamal public key cryptosystem, compute the pair of numbers (C₁, C₂) that Bob sends to Alice. Note: Do not work out how Alice computes the plaintext message m from the ciphertext (C₁, C₂).
(4) Elgamal public key cryptosystem (encryption): Start with the prime p = 13 and the primitive root g = 2. Alice sends Bob the public key A = 3. Bob wants to send the message m = 10 to Alice. Bob chooses the random element k = 3. Using the Elgamal public key cryptosystem, compute the pair of numbers (C₁, C₂) that Bob sends to Alice. Note: Do not work out how Alice computes the plaintext message m from the ciphertext (C₁, C₂).
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
All if possible
![### Elgamal Public Key Cryptosystem (Encryption)
#### Example Problem:
Given:
- Prime \( p = 13 \)
- Primitive root \( g = 2 \)
**Steps:**
1. **Public Key Exchange:**
- Alice sends Bob the public key \( A = 3 \).
2. **Message Encryption:**
- Bob wants to send the message \( m = 10 \) to Alice.
- Bob chooses the random element \( k = 3 \).
3. **Compute Ciphertext Pair \( (c_1, c_2) \):**
Using the Elgamal cryptosystem, Bob computes the pair \((c_1, c_2)\) to send to Alice.
**Note:** The problem requires computing the ciphertext \((c_1, c_2)\) but does not require demonstrating how Alice retrieves the plaintext message \( m \) from \((c_1, c_2)\).
To compute the ciphertext:
- Calculate \( c_1 \):
\[
c_1 = g^k \mod p
\]
Substituting the values:
\[
c_1 = 2^3 \mod 13 = 8
\]
- Calculate \( c_2 \):
\[
c_2 = m \cdot A^k \mod p
\]
Substituting the values:
\[
c_2 = 10 \cdot 3^3 \mod 13
\]
First, compute \( 3^3 \mod 13 \):
\[
3^3 = 27 \quad \text{and} \quad 27 \mod 13 = 1
\]
Then:
\[
c_2 = 10 \cdot 1 \mod 13 = 10
\]
Thus, the pair \((c_1, c_2)\) that Bob sends to Alice is \( (8, 10) \).](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2F5c5ad030-3ec8-4fd2-8d64-821b0d0d0877%2F415ccd0c-4067-48f0-ad15-a1581a322f93%2Fwx3iste_processed.png&w=3840&q=75)
Transcribed Image Text:### Elgamal Public Key Cryptosystem (Encryption)
#### Example Problem:
Given:
- Prime \( p = 13 \)
- Primitive root \( g = 2 \)
**Steps:**
1. **Public Key Exchange:**
- Alice sends Bob the public key \( A = 3 \).
2. **Message Encryption:**
- Bob wants to send the message \( m = 10 \) to Alice.
- Bob chooses the random element \( k = 3 \).
3. **Compute Ciphertext Pair \( (c_1, c_2) \):**
Using the Elgamal cryptosystem, Bob computes the pair \((c_1, c_2)\) to send to Alice.
**Note:** The problem requires computing the ciphertext \((c_1, c_2)\) but does not require demonstrating how Alice retrieves the plaintext message \( m \) from \((c_1, c_2)\).
To compute the ciphertext:
- Calculate \( c_1 \):
\[
c_1 = g^k \mod p
\]
Substituting the values:
\[
c_1 = 2^3 \mod 13 = 8
\]
- Calculate \( c_2 \):
\[
c_2 = m \cdot A^k \mod p
\]
Substituting the values:
\[
c_2 = 10 \cdot 3^3 \mod 13
\]
First, compute \( 3^3 \mod 13 \):
\[
3^3 = 27 \quad \text{and} \quad 27 \mod 13 = 1
\]
Then:
\[
c_2 = 10 \cdot 1 \mod 13 = 10
\]
Thus, the pair \((c_1, c_2)\) that Bob sends to Alice is \( (8, 10) \).
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps

Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you

Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON

Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON

Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education