StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Essay example - Cryptosystems Based on Discrete Logarithm

Only on StudentShare
Pages 4 (1004 words)
Any data we input into the computer with the help of the key board is converted into numbers of the binary system in accordance with ASCII code. For instance the character 'A' is entered as 10100001 in the binary notation (Subramaniun, 140), which corresponds to the number 161 in the usual decimal notation…

Extract of sample

Rather it will be sent as the binary string corresponding to another number which depends on the number 161 according to some fixed rule. For example we can subtract 161 from the largest 3-digit number 999 and send the result 838. Thus the rule for encryption is:
But there is a drawback of using this method of encryption. The receiver has also to be conveyed what rule has been used for the encryption, so that he can decrypt it. If some hacker in between cracks the information about this rule, then it is a trivial job for him to get the number 161 back from 838. For, he will easily deduce from this rule for encryption, the rule for decryption:
Therefore we make use of an ingenious technique. This technique makes the decryption of the encrypted message very difficult (if not impossible) for any third person (hacker). In order to know the technique, we need to learn some of the mathematical concepts. So first of all we take up these.
Given two natural numbers and an integer n, then by the modular exponentiation of b to the base a, which is symbolized as, we mean obtaining the remainder on dividing. Thus, for example,, on being evaluated yields 7. Observe that we can also write using the above concept of congruence modulo m.
Further given two natural numbers and an integer n, then the smallest (non-negative) integer x (if exists) such that, is known as the discrete logarithm of b to the base a. ...
Download paper
Not exactly what you need?

Related papers

Programmable control engineering
In succession from the PC could be spread out through a company's local area network or web functioning client-server expertise. Presently, with the convergence of underlying microprocessor expertise as well as software programming techniques, myriad users find that PLCs offers an economic resolve to real time regulation in diminutive- to medium sized process plants principally when integrated…
20 pages (5020 words)
Geographical information systems
The problems concerned can be broadly described as 'environmental management problems'. Examples of environmental management problems range from those of global scale (climate change, ozone depletion), through international scale (atmospheric transportation of radiation and pollutants), to regional and local scales (river pollution, sitting of potentially hazardous facilities) (Wyatt, 1995). What…
12 pages (3012 words)
Information Theory and Cryptography
In the present context, with the advent of computers in every aspect of daily routines of individuals and organizations in the 21st century, large amounts of information have to stored in or transmitted through unsafe media. It becomes essential that such information is not accessible to those who are not privy to it. Thus, to this effect of lending exclusivity to information stored or…
11 pages (2761 words)
Web Based Systems
Although you should make full use of any source material, which would normally be an occasional sentence and/or paragraph (referenced) followed by your own critical analysis/evaluation. You will receive no marks for work that is not your own. Your work may be subject to checks for originality which can include use of an electronic plagiarism detection service. …
3 pages (753 words)
Web Based Instructional Intervention and Information Literacy.
Web-based instruction strategies employ the Internet in delivering instructional information. A current teaching method can be supported by web-based instruction can support an existing teaching method or computer-based instructional methods can be used instead of the existing method of teaching. These act as an extension of colleges and universities, businesses, teachers, and/or parents in…
90 pages (22590 words)
A usb-camera based pointing device
Apparently these devices are new in the market and available systems that perform related task are usually hardwired and expensive making them inaccessible to generally users. Therefore, the objective of this project is to build a system that's affordable, convenient and readily available to people from various background. In general people prefer to have intuitive systems when performing…
16 pages (4016 words)