The Elgamal Cryptosystem: Joint Advanced Students Seminar 2005
The Elgamal Cryptosystem: Joint Advanced Students Seminar 2005
The Elgamal Cryptosystem: Joint Advanced Students Seminar 2005
TUM Informatik
Structure
Public Key Cryptography Assigned Complexity Problems ElGamal Cryptosystem Importance of Correct Implementation Summary
Procedure 1. Bob computes a public and a private key, the keypair 2. Bob publishes his public key 3. Alice Encrypts the message using Bobs public key 4. Alice sends the message to Bob. 5. Bob encrypts the message using his private key Effect:
Nobody intercepting the message can read nor alter it unrecognized
public key Alice encrypt using public key Bob decrypt using private key
encrypted message
Procedure: 1. 2. 3.
Problems
vulnerable to the man-in-the-middle attack vulnerable to chosen-plaintext attacks ( signed keys) not useful for one way communication (e.g. email)
Dife-Hellmann Problem DH
Instance:
A multiplicative group (G, ), a generator g of G, two public key parts g a and g b
Question:
Find the common key g ab
Question:
Find the unique integer a, 0 a n 1, such that g a = x. a can be described as logg x
Complexity of DL and DH
Lower bound: (p) with p = greatest prime divisor of the group order Related problem: Decision DH (DDH)
Instance: the triple g a , g b and g c Question: is c ab
(mod p)?
Algorithms for DL
Given: Generator g of G, beta G Wanted: a,1 < a < p 1 Assumption: Multiplication of x, y G in O(1) 2. sort the list wrt. the second coordinate 3. given a , perform a binary search on the list First step: O(n), Second step: O(n log n), Third step: O(log n) Neglecting logarithmic factors: Precomputation-time: O(1) Space: O(n), Solving in O(1)
Shank, Pollard Rho, Pholig-Hellman
ElGamal Cryptosystem
Presented in 1984 by Tather Elgamal Key aspects:
Based on the Discrete Logarithm problem Randomized encryption
Application:
Establishing a secure channel for key sharing Encrypting messages
Problems:
Duplicates message length Depends on intractability of DL and DH
Effects
All signatures created with GnuPG up to the day of x
considered compromised
1024 165
1280 183
1536 198
1792 212
2048 225
2304 237
... ...
Summary
What have we heared in this presentation?
Public Key scheme - suitable for sharing symetric keys Discrete Logarithm Problem - even harder than
F ACT ORIZE
Discussion
Questions from the audience? Why are hybrid cryptosystems used for encrypting e.g. a
vpn?
Literature
Cryptography: Theory and practice, Douglas R. Stinson New directions in cryptography, Dife and Hellman Handbook of applied Cryptography, Menezes, van
Oorschot, Vanstone