CST433 Module3
CST433 Module3
Asymmetric Cryptosystem
Dr. Anver. S. R
Chapter 9 – Public Key
Cryptography and RSA
Given = (mod p ) x
Find x
x = L ( )
We denote this as
30
Diffie-Hellman is an alternative to RSA for key
exchange, but is based on discrete logs
Alice chooses secret k, computes and sends to Bob the pair (r,t) where
◼ r ≡ k (mod p)
◼ t ≡ km (mod p)
Steps 1:- Select a large prime number P, This is first part of Public Key.
Step 2:- Select a decryption key or private key a.
Steps 3:- Select the Second part of public key as α.
Steps 4:- The Third part of public key as β= α˄a mod P
Step 5:- The Public key will be (α,β,P) and Private key will be a.
Example:-
Example:-
Let k= 4 ana PT = 7
From Previous P=11, α=2 ana a=3
ana public key will be (2,8,11)
C1 = α˄k moa P = 2˄4 moa11= 5
C2=PT. β˄k moa P = 7. 2˄8 moa 11 = 6
Hence Cipher Text is (5,6)
EIGamal Key aecryption
Steps 1:- Compute the plain text using the following formula
PT = (C2.C1˄a) ˄ -1 moa P
Example:-
PT = (C2.C1˄a) ˄ -1 moa P
PT = (6. 5˄3) ˄-1 moa 11
\ PT = (6.3) moa 11= 7
•