Question

After looking at the RSA algorithm for asymmetric key encryption and decryption. And after looking at...

After looking at the RSA algorithm for asymmetric key encryption and decryption. And after looking at Diffie-Hellman Exchange and at the Elgamal encryption scheme that can use the key derived from the exchange.

State the justification for having this alternate mechanism when RSA is already well established. Consider the security and the computational aspects of the schemes. Be as specific as possible.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

ElGamal encryption is one of many encryption schemes which utilizes randomization in the encryption process. Others include McEliece encryption, and Goldwasser-Micali , and Blum-Goldwasser probabilistic encryption.

Deterministic encryption schemes such as RSA may also employ randomization in order to circumvent some attacks. The fundamental idea behind randomized encryption techniques is to use randomization to increase the cryptographic security of an encryption process through one or more of the following methods – Increasing the effective size of the plaintext message space;

•Precluding or decreasing the effectiveness of chosen plaintext attacks by virtue of a one-to-many mapping of plaintext to cipher-text; and

•Precluding or decreasing the effectiveness of statistical attacks by leveling the a priori probability distribution of inputs..

The problem of breaking the ElGamal encryption scheme, i.e., recovering m given p,g,(g^x) and a, b is equivalent to solving the Diffie-Hellman problem . Infact, the ElGamal encryption scheme can be viewed as simply comprising a D. Diffie-Hellman key exchange to determine a session key (g ^ (x*k)), and then encrypting the message by multiplication with that session key. For this reason, the security of the El-Gamal encryption scheme is said to be based on the discrete logarithm problem in Zp*, although such an equivalence has not been proven. It is critical that different random integers k be used to encrypt different messages. Suppose the same k is used to encrypt two mess ages m1 and m2 and the resulting cipher-text pairs are (a1,b1) and (a2,b2). Then b1/b2= m1/m2, and m2 could be easily computed if m1 were known.

The ElGamal algorithm can be use as RSA algorithm for public key encryption because: •

RSA encryption depends on the difficulty of factoring large integers while

ElGamal encryption depends on on the difficulty of computing dicrete logs in a large prime modulus.

ElGamal is nothing but the advance version of Diffie- Hellmen key exchange protocol. But , ElGamalis not good because its cipher text is two times longer than the plain text.

ElGamal is good because it gives different cipher text for same plain text each time.For image data, the size of the cipher text is very huge & reshaping the encrypted data was not understood.

ElGamal ‘s encryption is very simple because it is multiplication of message and symmetric key(i.e c=m*k).

The Diffie-Hellman algorithm is being used to establish a shared secret that can be used for secret
communications while exchanging data over a public network using the elliptic curve to generate points and get the secret key using the parameters.

Add a comment
Know the answer?
Add Answer to:
After looking at the RSA algorithm for asymmetric key encryption and decryption. And after looking at...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • . Compare and contrast Asymmetric Key Algorithm's: RSA, Diffie-Hellman, and Elliptic Curve vs Symmetric Key Algorithms:...

    . Compare and contrast Asymmetric Key Algorithm's: RSA, Diffie-Hellman, and Elliptic Curve vs Symmetric Key Algorithms: Triple DES, Twofish, RC(6), and AES then please discuss what is your personal preferred method of encryption and why?

  • Digital Signature (5-5): In the course notes we looked at RSA for encryption and signatures (using...

    Digital Signature (5-5): In the course notes we looked at RSA for encryption and signatures (using exactly the same mathematical formula), and ElGamal for encryption. There has been several questions on using ElGamal for signature. The ElGamal encryption algorithm cannot be used for signatures but there are signature schemes that is based on discrete logarithm. (a) Search for simple explanation of the ElGamal signature scheme and DSA signature scheme (Hint: Wikipedia). Can these algorithms be used to encrypt a message?...

  • Perform encryption and decryption using the RSA algorithm, for the following p = 3, 9 =...

    Perform encryption and decryption using the RSA algorithm, for the following p = 3, 9 = 11, e = 7 M = 5 What is the public key PU? What is the private key PR? What is the cipertext C? How does the decryption to covert the ciphertext back to the plaintext M?

  • We are studying on the Public Key Encryption/Decryption. Q3. Bob just discovered an efficient algorithm to...

    We are studying on the Public Key Encryption/Decryption. Q3. Bob just discovered an efficient algorithm to factor large numbers, i.e., for any given number n, Bob can factor the number in O(log(n)) time. Please describe the impact of this discovery on the RSA algorithm.

  • select the best encryption algorithm to math scenario and give reason

    ? Data Encryption Standard (DES)? Rivest, Shamir, and Adleman (RSA) encryption algorithm? Triple DES? Diffie-Hellman key exchange? International Data Encryption Algorithm (IDEA)? El Gamal encryption algorithm? Carlisle Adams and Stafford Taveres (CAST) algorithm? Elliptic curve cryptography (ECC)? Blowfish? Secure Sockets Layer (SSL)? Advanced Encryption Standard (AES)? Digital signature1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitorwill send e-mail messages pretending to be from...

  • common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion al...

    common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature Confidential services inc. is a milatary support branch consisiting of 14,000,000 computers with internet access and 250,000 servers. All employees must have security clearances. they communicate mainly through internally secured systems. confindential services inc. is concered that sensitive information may inadvertenly be exposed and wants to implement a symmetric file encryption algorithm that is strong but...

  • common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion al...

    common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature Scenario: NetSeclt is a multinational IT services company consisiting of 100,000 computers that have internet access and 40,000 servers. ALl employees communicate using smartphones and email. Many employees work from home and travel extensively. Netselt would like to implement an asymmetric general-purpose encryption technology that is very diffcult to break and has a compact design so...

  • common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion al...

    common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature scenario: Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate usuing smartphones. Top Ads primary concern is protecting the data on the smartphones. Select an encryption solution that best protects the smartphone and justify the recommendation,

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT