Question

Consider the ElGamal scheme (described in section 10.2) with q = 11 and α = 6....

Consider the ElGamal scheme (described in section 10.2) with q = 11 and α = 6. A has a private key XA = 2 and public key YA = 3.

(a) B choses the random integer k = 3, and the plaintext B wants to encrypt is M = 6. Show what will be calculations done by B to get the value of the ciphertext C1, C2.

(b) Show what will be calculations done by A to recover the plaintext M from C1, C2. Note that you first need to figure out what is the value of K.

Homework Answers

Answer #1

If you have any queries, please comment below.

Please upvote , if you like this answer.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Consider the ElGamal encryption scheme over an elliptic curve E: y2 =x3+x+6 over GF(11) and let...
Consider the ElGamal encryption scheme over an elliptic curve E: y2 =x3+x+6 over GF(11) and let P=(2,7) be a group generator, given a private key x=9, 1. Compute the public key; 2. Compute the ciphertext of M=(8,3), given k=7 and the public key; 3. Decrypt the ciphertext with the private key.
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations. 2 points    QUESTION 20 Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate. 2 points    QUESTION 21 Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT