ElGamal Public Key Cryptosystem
Alice and Bob agree on a large prime number and on an element of with a large prime order.
Alice chooses a private key , with , and publishes .
Bob chooses a random ephemeral key .
He uses Alice's public key to compute and , where is the plaintext.
He then send to Alice.
To recover the plaintext , Alice computes . This works because .
An eavesdropper has to find from (discrete logarithm problem).
A middle-man can easily manipulte ; for example, to replace by all that is necessary is to replace by .
This public key cryptosystem, implemented exactly as above, has some security problems.
Last updated