Crypto Assignment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

ElGamal Algorithm for Encryption of Data

Transmission
Submitted in fulfilment of assignment and action plan

CRYPTOGRAPHY
15EC744

NAME AND USN:


1) Shreyas Kupsad 1BI16EC186
2) B Dileepkumar 1BI16EC020

BANGALORE INSTITUTE OF TECHNOLOGY


DEPARTMENT OF ELECTRONICS AND
COMMUNICATION
ABSTRACT
With continuous development of network technology, more and
more attacks on system from internet have become more automated
and caused greater damage and loss. It is important to improve
network security and protect transmission information. General
speaking, it is able to protect information, to some extent, with file
encryption and digital signature. This article explores ElGamal public
key encryption algorithm that is put practice into information
transmission. Base on it, it also aims to achieve the text encryption
and decryption, image encryption and decryption so as to guarantee
information transmission.

INTRODUCTION
ElGamal algorithm based on public key cryptosystem and elliptic
curve cryptography encryption system is widely used in digital
signatures aspects, which is used for not only data encryption but
also digital signatures as well. Its safety depends on the calculation of
the discrete logarithm finite field. The security of ElGamal algorithm
is enhanced by elliptic curve cryptography encryption system, so it
has been widely used in intelligent card (encryption and
authentication) field. The main characteristic of the ElGamal
algorithm is in the process of encryption, cipher text is two times
longer than plaintext. When encrypted, it will generate a random K in
cipher text, so even if the same plain text is encrypted twice, the
result of cipher text is different, which makes the ordinary decoding
methods such as Plaintext attack invalid. Its deficiency, the cipher
text is too longer and this algorithm calculation is time consuming, is
the bottleneck of widespread application
ElGamal Encryption
INPUT : Domain parameters (p,q,g); recipient's public key B;
encoded message mm in range 0 < m < p−1.
OUTPUT: Ciphertext (c1, c2).

1. Choose a random k in the range 1 < k < p−1


2. Compute c1=gk mod p
3. Compute c2=mBk mod p
4. Return ciphertext (c1,c2)

ElGamal Decryption
INPUT : Domain parameters (p,q,g); recipient's private key B;
ciphertext (c1,c2).
OUTPUT: Message representative, m.

1. Compute m = cp−b−1 c2 mod p


2. Return m.

BLOCK DIAGRAM:
Advantages and Disadvantages
Advantages:
1. One of the strength of ElGamal is its non-determinism-
encrypting the same plaintext multiple times will result in
different ciphertexts, since a random k is chosen each time.

2. El-Gamal encryption is used in the free GNU privacy Guard


Software, recent versions of PGP, and other cryptosystems.

Disadvantages:
1. Its need for randomness, and its slower speed (especially for
signing).

2. The potential disadvantage of the ElGamal system is that


message expansion by a factor of two takes place during
encryption (means the ciphertext is twice as long as the plaintext.)

CONCLUSION
File transfer encryption is aim to prevent others to open the file and
access the contents of the file. In a public key infrastructure, the
most important is to access the public / private key. Based on
solution of the difficulty of the discrete logarithm, this paper
proposes one security mode to transmit important information. At
the same time, security of data transmission is improved by text
encryption and image encryption implemented in ElGamal public key
encryption algorithm.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy