Chapter 2: Encryption Algorithms & Systems
Chapter 2: Encryption Algorithms & Systems
AES
RSA Encryption
El Gamal Algorithms
Hashing Algorithms
Key Exchange
Cryptographic Hash Functions
Hash
Message Digest
Digital Signatures
Certificates
DS = E (Keypriv, P)
The receiver verifies the signature using the
sender’s public key.
P = D (Keypub, DS)
V. Sawma, Computer Security 4
El Gamal Algorithm
To generate a key pair:
Choose a prime p and two integers, a and
x, such that a < p and x < p.
The prime p should be chosen so that (p-
1) has a large prime factor q.
Calculate the public key: y = ax mod p.
Private key: x
Public key: y
• Message Padding
• Checksum calculation
• Block division and compression function
• Hash generation – MD generation
$ md5 /usr/bin/ls