StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cryptosystems Based on Discrete Logarithm - Essay Example

Cite this document
Summary
Any data we input into the computer with the help of the key board is converted into numbers of the binary system in accordance with ASCII code. For instance the character 'A' is entered as 10100001 in the binary notation (Subramaniun, 140), which corresponds to the number 161 in the usual decimal notation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Cryptosystems Based on Discrete Logarithm
Read Text Preview

Extract of sample "Cryptosystems Based on Discrete Logarithm"

Download file to see previous pages

Rather it will be sent as the binary string corresponding to another number which depends on the number 161 according to some fixed rule. For example we can subtract 161 from the largest 3-digit number 999 and send the result 838. Thus the rule for encryption is: But there is a drawback of using this method of encryption. The receiver has also to be conveyed what rule has been used for the encryption, so that he can decrypt it. If some hacker in between cracks the information about this rule, then it is a trivial job for him to get the number 161 back from 838.

For, he will easily deduce from this rule for encryption, the rule for decryption: Therefore we make use of an ingenious technique. This technique makes the decryption of the encrypted message very difficult (if not impossible) for any third person (hacker). In order to know the technique, we need to learn some of the mathematical concepts. So first of all we take up these. Given two natural numbers and an integer n, then by the modular exponentiation of b to the base a, which is symbolized as, we mean obtaining the remainder on dividing.

Thus, for example,, on being evaluated yields 7. Observe that we can also write using the above concept of congruence modulo m. Further given two natural numbers and an integer n, then the smallest (non-negative) integer x (if exists) such that, is known as the discrete logarithm of b to the base a. (http://www.math.clemson.edu., 1)To find the modular exponentiation is an easy task even if the numbers a and b are large. For, we can make use of the 'square and multiply method' (Schneier, 244) as explained in what follows: We know that stands for the remainder obtained on dividing by n.

For large values of a and b, it will be very difficult to evaluate the expression. But to evaluate is much easier. For we can find the remainder (say) on dividing, multiply and obtain the remainder (say) on dividing the product by n; and so on till the number a is taken b times for the multiplication and thus the last remainder is obtained. As an illustration let us compute. Let us find the remainder on dividing; we get 1. Then find the remainder on dividing 1.3 (=3) by 8; we get 3. Now find the remainder on dividing 3.3 (=9) by 8; we get 1.

Again find the remainder on dividing 1.3 (=3) by 8; we get 3. Finally find the remainder on dividing 3.3 (=9) by 8; we get 1, which is the result of the modular exponentiation. For the sake of verification we can compute. It comes out 729. On dividing 729 by 8 we get 1, the same result. However, to find the discrete logarithm for large numbers is a very hard problem by any means. So if we base the cryptosystem on the discrete logarithm, it becomes extremely hard for a hacker to crack it. Now we will describe this system.

The basic work for the development of the system was done by Diffie and Hellman in 1976, but the system was fully developed by ElGamal. ((http://www.math.clemson.edu., 2). First we take up the work done byDiffie-HellmanThese two fellows invented an algorithm which can be used by two persons to generate a secret common key. The algorithm is explained below.Let Alex and Bobby be the two persons who are going to exchange some information over the internet

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cryptosystems Based on Discrete Logarithm Essay”, n.d.)
Cryptosystems Based on Discrete Logarithm Essay. Retrieved from https://studentshare.org/technology/1522163-cryptosystems-based-on-discrete-logarithm
(Cryptosystems Based on Discrete Logarithm Essay)
Cryptosystems Based on Discrete Logarithm Essay. https://studentshare.org/technology/1522163-cryptosystems-based-on-discrete-logarithm.
“Cryptosystems Based on Discrete Logarithm Essay”, n.d. https://studentshare.org/technology/1522163-cryptosystems-based-on-discrete-logarithm.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cryptosystems Based on Discrete Logarithm

The Naperian Logarithm

Logarithms are used in graphical representation of the collected data and can also be used to forecast a trend based on the given data.... A common logarithm, or the decadic logarithm, on the other hand, is a logarithm with base 10.... In such cases, a logarithm can make the problematic function linear and provide a pretty accurate approximation.... )The graph provides a linear and simple representation, without the use of logarithm, this could be a very problematic function to deal with....
2 Pages (500 words) Essay

College mathmatices

By definition, logarithm of a given number to a given base is the power to which you need to raise the base in order to get the number… It's also called as the inverse of the exponential function.... As a formula it can be expressed as, Mathematicians have classified logarithm in two ways; Common logarithms and Natural logarithms.... A logarithm having a base of 10 is defined as Common The value of 10 is used as a base because mathematicians have found that logarithms having a base of 10 were more useful for computations and they possessed many advantages that were not obtained in other bases....
3 Pages (750 words) Essay

What is Discrete trial Training

Its success is based on the fact that the child repeats the same procedures several times from the beginning to the end of his practice (Thorne, 1980).... This method involves taking away something from the child, when he performs any undesired behavior.... Various response cost plans do not work because the child was supposed to… Short time durations to wait for fortification are the best for children with ADHD (Moore, 2001). This is the punishment the child gets whenever he or she deviates from the desired behavior....
3 Pages (750 words) Research Paper

Logarithms math problems

(Enter the logarithm function in the form log a(b).... 5 = log 3 243 13 = log 10 10002p = log m n2: Use the definition of logarithm to simplify each expression.... That is, use the properties of logarithms to write each expression as a single logarithm with a coefficient of 1....
2 Pages (500 words) Assignment

See like a Scientist

In order to understand the linear and the logarithm scale, this paper explores the comparison of the linear and logarithm scales aligning them with clear differences and similarities.... Figure 1 and figure 2 below represent the linear and the logarithm scales.... igure 1: Linear scale representing the number of fish killed from environmental pollutants versus yearsFigure 2: logarithm scale representing the number of fish killed from environmental pollutants versus yearsThe number of fish killed as a human hearing can better be measured using the logarithm scale than the linear scale....
2 Pages (500 words) Assignment

The Suitable Applications for Iris Based Key Generation Method

This paper "The Suitable Applications for Iris based Key Generation Method"  focuses on securing information systems is another potentially suitable application of an iris-based key generation method for cryptography.... As opposed to the use of the traditional passwords and Pins, crypto-biometric systems such as the iris-based cryptography keys are significantly more stable and less susceptible to attacks.... For example, the iris-based key generation method for cryptography together with generation algorithms can be used to effectively bind cryptography keys with the biometric template of a user in such a way that makes it significantly impossible to reveal the key without a successful biometric authentication....
6 Pages (1500 words) Assignment

Digital Signature Algorithms and Application of a Scheme of Digital Signature in Electronic Government

The author of the paper "Digital Signature Algorithms and Application of a Scheme of Digital Signature in Electronic Government" states that digital signatures are hard to be attacked by the intruders who tried to distort the messages hence making them popular.... hellip; With the rapid growth of mobile and wireless technologies, people have started using computer technology in e-commerce, mobile fund transfer, games online, and theatre booking....
13 Pages (3250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us