Got a tricky question? Receive an answer from students like you! Try us!

Cryptosystems Based on Discrete Logarithm - Essay Example

Only on StudentShare
Masters
Author : carey46
Essay
Technology
Pages 4 (1004 words)

Summary

Any data we input into the computer with the help of the key board is converted into numbers of the binary system in accordance with ASCII code. For instance the character 'A' is entered as 10100001 in the binary notation (Subramaniun, 140), which corresponds to the number 161 in the usual decimal notation…

Extract of sample
Cryptosystems Based on Discrete Logarithm

Rather it will be sent as the binary string corresponding to another number which depends on the number 161 according to some fixed rule. For example we can subtract 161 from the largest 3-digit number 999 and send the result 838. Thus the rule for encryption is:
But there is a drawback of using this method of encryption. The receiver has also to be conveyed what rule has been used for the encryption, so that he can decrypt it. If some hacker in between cracks the information about this rule, then it is a trivial job for him to get the number 161 back from 838. For, he will easily deduce from this rule for encryption, the rule for decryption:
Therefore we make use of an ingenious technique. This technique makes the decryption of the encrypted message very difficult (if not impossible) for any third person (hacker). In order to know the technique, we need to learn some of the mathematical concepts. So first of all we take up these.
Given two natural numbers and an integer n, then by the modular exponentiation of b to the base a, which is symbolized as, we mean obtaining the remainder on dividing. Thus, for example,, on being evaluated yields 7. Observe that we can also write using the above concept of congruence modulo m.
Further given two natural numbers and an integer n, then the smallest (non-negative) integer x (if exists) such that, is known as the discrete logarithm of b to the base a. ...
Download paper

Related Essays

Programmable control engineering
In succession from the PC could be spread out through a company's local area network or web functioning client-server expertise. Presently, with the convergence of underlying microprocessor expertise as well as software programming techniques, myriad users find that PLCs offers an economic resolve to real time regulation in diminutive- to medium sized process plants principally when integrated with regulatory PCs employing hybrid structures. The main work of this article illustrates that programmable logic circuits are responsive to quick and repetitious organized errands, that runs on PCs…
20 pages (5020 words)
Geographical information systems
The problems concerned can be broadly described as 'environmental management problems'. Examples of environmental management problems range from those of global scale (climate change, ozone depletion), through international scale (atmospheric transportation of radiation and pollutants), to regional and local scales (river pollution, sitting of potentially hazardous facilities) (Wyatt, 1995). What they have in common is that they are all concerned with spatially distributed phenomena. This means that the information relating to the phenomena can be spatially referenced and an appropriately…
12 pages (3012 words)
Information Theory and Cryptography
In the present context, with the advent of computers in every aspect of daily routines of individuals and organizations in the 21st century, large amounts of information have to stored in or transmitted through unsafe media. It becomes essential that such information is not accessible to those who are not privy to it. Thus, to this effect of lending exclusivity to information stored or transmitted, the science of cryptography today has pervaded all areas of information technology today.…
11 pages (2761 words)
Web Based Systems
Although you should make full use of any source material, which would normally be an occasional sentence and/or paragraph (referenced) followed by your own critical analysis/evaluation. You will receive no marks for work that is not your own. Your work may be subject to checks for originality which can include use of an electronic plagiarism detection service. …
3 pages (753 words)
Web Based Instructional Intervention and Information Literacy.
Web-based instruction strategies employ the Internet in delivering instructional information. A current teaching method can be supported by web-based instruction can support an existing teaching method or computer-based instructional methods can be used instead of the existing method of teaching. These act as an extension of colleges and universities, businesses, teachers, and/or parents in providing learning opportunities to various individuals such as students and employees. …
90 pages (22590 words)
A usb-camera based pointing device
Apparently these devices are new in the market and available systems that perform related task are usually hardwired and expensive making them inaccessible to generally users. Therefore, the objective of this project is to build a system that's affordable, convenient and readily available to people from various background. In general people prefer to have intuitive systems when performing graphical task and this could be an inexpensive way of achieving this because a USB cam typical cost about '25.…
16 pages (4016 words)