How can we find the private key?

  • MHB
  • Thread starter mathmari
  • Start date
In summary, Alice uses the ElGamal signature scheme with the variables $p=47$, $q=23$ and $g=2$. For two different messages $m_1, m_2$ with $h(m_1)=4, h(m_2)=3$ she produces the signatures $(r_1, s_1)=(14, 8)$ and $r_2, s_2)=(14, 15)$. To calculate the private key of Alice without calculating a discrete logarithm, we can use the relations $r_1=g^{k_1}$ and $r_2=g^{k_2}$ and solve for the unknowns $k$ and $a$ by substituting
  • #1
mathmari
Gold Member
MHB
5,049
7
Hey! :eek:

Alice uses the ElGamal signature scheme with the variables $p=47$, $q=23$ and $g=2$. For two different messages $m_1, m_2$ with $h(m_1)=4, h(m_2)=3$ she produces the signatures $(r_1, s_1)=(14, 8)$ and $r_2, s_2)=(14, 15)$. Calculate the private key of Alice, without calculating a discrete logarithm.

We have the following relations: $$r_1=g^{k_1} \ \ , \ \ s_1=k_1^{-1}(h(m_1)+af(r))\pmod q \\ r_1=g^{k_2} \ \ , \ \ s_2=k_2^{-1} (h(m_2)+af(r))\pmod q$$

What can we do to find $a$ ?? (Wondering)
 
Mathematics news on Phys.org
  • #2
mathmari said:
Hey! :eek:

Alice uses the ElGamal signature scheme with the variables $p=47$, $q=23$ and $g=2$. For two different messages $m_1, m_2$ with $h(m_1)=4, h(m_2)=3$ she produces the signatures $(r_1, s_1)=(14, 8)$ and $r_2, s_2)=(14, 15)$. Calculate the private key of Alice, without calculating a discrete logarithm.

We have the following relations: $$r_1=g^{k_1} \ \ , \ \ s_1=k_1^{-1}(h(m_1)+af(r))\pmod q \\ r_1=g^{k_2} \ \ , \ \ s_2=k_2^{-1} (h(m_2)+af(r))\pmod q$$

What can we do to find $a$ ?? (Wondering)

Hi mathmari,

I don't understand the $f$ in your relations. The relations should be,

\[s_1=k_1^{-1}(h(m_1)+ar_1)\pmod q \]

\[s_2=k_2^{-1} (h(m_2)+ar_2)\pmod q$\]

Refer: https://en.wikipedia.org/wiki/ElGamal_signature_scheme

Note that, $r_1=g^{k_1}\mbox{ and }r_2=g^{k_2}$. Since $r_1=r_2$ it implies that, $k_1=k_2=k$.

Now all you a got to do is substitute the given values into the equations and you'll get two equations with $k$ and $a$ as unknowns.
 
  • #3
Ok... Thanks a lot! (flower)
 
  • #4
mathmari said:
Ok... Thanks a lot! (flower)

You are welcome. :)
 

FAQ: How can we find the private key?

How does a private key work?

A private key is a unique string of numbers and letters that is used to generate a digital signature for a specific transaction or message. This signature serves as a way to verify the identity of the sender and ensure the integrity of the information being transmitted.

Where is the private key stored?

The private key is typically stored in a digital wallet or keychain, which can be a physical device or a software application. It is important to keep the private key secure and confidential as it is the key to accessing and controlling your digital assets.

How can we generate a private key?

A private key can be generated using various cryptographic algorithms and tools. One common method is to use a random number generator, which produces a unique string of characters that can serve as the private key. It is important to use a secure and reputable method for generating a private key.

Can we recover a lost private key?

In most cases, once a private key is lost or forgotten, it cannot be recovered. This is because the private key is used to decrypt encrypted data, and without it, the data cannot be accessed. It is important to keep backups of your private key and to use secure methods for storing it to avoid losing it.

How can we protect our private key from hackers?

To protect your private key from hackers, it is important to keep it secure and confidential. This can include using strong passwords, encryption, and multi-factor authentication methods. It is also important to regularly update your software and devices to ensure they are not vulnerable to cyber attacks.

Back
Top