5.Public-Key Encryption Scheme (ElGamal)
5.Public-Key Encryption Scheme (ElGamal)
Schemes
21CSPH0 Blockchain Technology and Applications
Dharani J
Roadmap
• Diffie-Hellman Key Exchange
• Protocol
• Drawback
• Birth of Public-key Cryptography
• ElGamal Encryption Scheme
Key-Exchange Protocol - Motivation
• Symmetric-key cryptography requires a pre-shared key to be
exchanged by the communicating parties
• How does a random secret key shared between the parties over a
public, insecure channel?
• Catch-22 situation
Diffie-Hellman Key Exchange Protocol -
History
Underlying Idea behind Diffie-Hellman (DH)
Key-Exchange Protocol
• The power of Asymmetry
• Certain Actions are very easy to execute, but extremely “difficult” to invert
Intuition behind DH Key-Exchange Protocol
Kindly Note: This slide is only for understanding. Kindly do not write this as an answer to Diffie-Hellman Key Exchange Protocol
Diffie-Hellman Key Exchange Protocol
(𝔾, 𝑜, 𝑞, 𝑔)
1. Sample 𝛽 ∈𝑟 ℤ𝑞
1. Sample 𝛼 ∈𝑟 ℤ𝑞
𝑢 = 𝑔𝛼
2. Compute v = 𝑔𝛽
2. Compute u = 𝑔𝛼
v = 𝑔𝛽
3. Compute 𝑢𝛽 = 𝑔𝛼𝛽
3. Compute 𝑣 𝛼 = 𝑔𝛼𝛽
Computational and Decisional Diffie-Hellman
Assumptions
Birth of Public-key Cryptography
• DH-exchange protocol requires both the parties to be online