Cryptography and Network Security: Fifth Edition by William Stallings
Cryptography and Network Security: Fifth Edition by William Stallings
Network Security
Chapter 10
Fifth Edition
by William Stallings
message
rather it can establish a common key
where
k
•C1 = a mod q // like D-H public key
•C2 = KM mod q // encrypted msg
ElGamal Message Exchange
encrypt M as a pair of integers (C1,C2) where
k
•C1 = a mod q ; C2 = KM mod q
A then recovers message by
recovering key K as K = C1
xA mod q
computing M as M = C2 K
-1 mod q