Lec-8 RSA and El Gamal
Lec-8 RSA and El Gamal
Lec. 8
RSA and El Gamal
Cryptosystems
10-1 INTRODUCTION
10.2
10.1.1 Keys
10.3
10.1.2 General Idea
10.12
10.1.2 Continued
Plaintext/Ciphertext
Unlike in symmetric-key cryptography, plaintext and
ciphertext are treated as integers in asymmetric-key
cryptography.
Encryption/Decryption
C = f (Kpublic , P) P = g(Kprivate , C)
10.13
10.1.3 Need for Both
10.14
10.1.4 Trapdoor One-Way Function
Functions
10.15
10.1.4 Continued
One-Way Function (OWF)
1. f is easy to compute.
2. f −1 is difficult to compute.
10.16
10.1.4 Continued
10.17
10.1.4 Continued
One-Way Function (OWF)
10.18
10.1.4 Continued
10.19
10-2 RSA CRYPTOSYSTEM
10.21
10.2.2 Procedure
10.22
10.2.2 Continued
10.23
10.2.2 Continued
10.24
10.2.2 Continued
Encryption
10.25
10.2.2 Continued
Decryption
10.26
10.2.2 Continued
Proof of RSA
10.27
10.2.3 Some Trivial Examples
Example 10. 5
10.28
10.2.3 Some Trivial Examples
Example 10. 6
10.29
10-4 ELGAMAL CRYPTOSYSTEM
10.36
10.4.2 Continued
Key Generation
10.37
10.4.2 Continued
10.38
10.4.2 Continued
10.39
10.4.3 Continued
Example 10. 10
10.40