0% found this document useful (0 votes)
15 views12 pages

5.Public-Key Encryption Scheme (ElGamal)

Uploaded by

Haris Balaji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views12 pages

5.Public-Key Encryption Scheme (ElGamal)

Uploaded by

Haris Balaji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Public-Key Encryption

Schemes
21CSPH0 Blockchain Technology and Applications
Dharani J
Roadmap
• Diffie-Hellman Key Exchange
• Protocol
• Drawback
• Birth of Public-key Cryptography
• ElGamal Encryption Scheme
Key-Exchange Protocol - Motivation
• Symmetric-key cryptography requires a pre-shared key to be
exchanged by the communicating parties

• How does a random secret key shared between the parties over a
public, insecure channel?
• Catch-22 situation
Diffie-Hellman Key Exchange Protocol -
History
Underlying Idea behind Diffie-Hellman (DH)
Key-Exchange Protocol
• The power of Asymmetry
• Certain Actions are very easy to execute, but extremely “difficult” to invert
Intuition behind DH Key-Exchange Protocol

Common random, secret mixture

Kindly Note: This slide is only for understanding. Kindly do not write this as an answer to Diffie-Hellman Key Exchange Protocol
Diffie-Hellman Key Exchange Protocol

(𝔾, 𝑜, 𝑞, 𝑔)

1. Sample 𝛽 ∈𝑟 ℤ𝑞
1. Sample 𝛼 ∈𝑟 ℤ𝑞
𝑢 = 𝑔𝛼
2. Compute v = 𝑔𝛽
2. Compute u = 𝑔𝛼
v = 𝑔𝛽
3. Compute 𝑢𝛽 = 𝑔𝛼𝛽
3. Compute 𝑣 𝛼 = 𝑔𝛼𝛽
Computational and Decisional Diffie-Hellman
Assumptions
Birth of Public-key Cryptography
• DH-exchange protocol requires both the parties to be online

• To get around the problem, Diffie and Hellman proposed a new


architecture
• Public-key cryptosystems
The Architecture of Public-Key Cryptosystem
Syntax of Public-key Cryptosystem
• Three tuple algorithms
1. Key Generation (Randomized)
• Input: Security Parameter
• Output: Pair of Keys
2. Encryption (Randomized)
• Input: Message(Plaintext) and Recepient’s Public Key
• Output: Ciphertext
3. Decryption (Deterministic)
• Input: Ciphertext and Secret Key
• Output: Plaintext
El Gamal Encryption Scheme

You might also like