Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen
Чтение книги онлайн.
Читать онлайн книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen страница 45
Now,
An example with a small prime
The common secret key possessed by
The security of the Diffie–Hellman (DH) key‐exchange rests on the assumption that the DH problem described now cannot be solved in a reasonable amount of time, i.e. is intractable.
Diffie–Hellman problem
Given a prime
A (potentially) more general problem is the discrete log problem.
(We remark that in the DH problem it suffices to consider the cases when
Discrete log problem
Given a prime
It is called the discrete log problem because
We should point out that, for security, one wants
Using the Diffie–Hellman idea, it is possible to construct a public‐key cryptosystem called the El Gamal Cryptosystem.
El Gamal Cryptosystem