How Can You Multiply Ciphertexts in ElGamal Without Decrypting?

In summary, ElGamal encryption is a public-key cryptosystem that uses both symmetric and asymmetric encryption for digital communication. It works by generating a public and private key pair, and the sender uses the recipient's public key to encrypt messages, while the recipient uses their private key to decrypt them. While it is considered secure against classical computer attacks, it is vulnerable to quantum computer attacks and chosen ciphertext attacks. ElGamal encryption can also be used for digital signatures to provide authentication and prevent tampering. It is commonly used in online banking, email, and other applications that require secure communication over an insecure network.
  • #1
mathmari
Gold Member
MHB
5,049
7
Hey! :eek:

At an ElGamal encryprion system at the group $\mathbb{Z}_{786}^{\star}$ with base $g=\overline{2}$ ( it is a generator ) the public key of Alice is $y=\overline{5}$. We see to encryptions $(r_1, c_1)=(318, 191)$ of the unknown message $m_1$ and $(r_2, c_2)=(79, 118)$ of the unkown message $m_2$. Show how you can calculate the encryption of the message $m_1 \cdot m_2 \pmod p$(without calculations $m_1$ and $m_2$).

Could you give me some hints what we could do ?? (Wondering)
 
Mathematics news on Phys.org
  • #2
mathmari said:
Hey! :eek:

At an ElGamal encryprion system at the group $\mathbb{Z}_{786}^{\star}$ with base $g=\overline{2}$ ( it is a generator ) the public key of Alice is $y=\overline{5}$. We see to encryptions $(r_1, c_1)=(318, 191)$ of the unknown message $m_1$ and $(r_2, c_2)=(79, 118)$ of the unkown message $m_2$. Show how you can calculate the encryption of the message $m_1 \cdot m_2 \pmod p$(without calculations $m_1$ and $m_2$).

Could you give me some hints what we could do ?? (Wondering)

Hi mathmari, :)

Elgamal is a Partially Homomorphic encryption scheme which means that there's a correspondence between the operations over the cipertext and the operations over the plaintext. The correspondence is multiplication. So when you multiply two ciphertexts the underlying plaintexts will be multiplied.

Hope this helps. :)
 

FAQ: How Can You Multiply Ciphertexts in ElGamal Without Decrypting?

What is ElGamal encryption system?

ElGamal encryption system is a public-key cryptosystem that uses both symmetric and asymmetric encryption to provide confidentiality and authentication for digital communication. It was developed by Taher ElGamal in 1985 and is based on the Diffie-Hellman key exchange algorithm.

How does ElGamal encryption work?

ElGamal encryption uses a public key to encrypt messages and a private key to decrypt them. The process begins with the generation of a public and private key pair. The sender of the message uses the recipient's public key to encrypt the message, and the recipient uses their private key to decrypt it.

Is ElGamal encryption secure?

ElGamal encryption is considered secure against attacks from classical computers, but it is vulnerable to attacks from quantum computers. It is also vulnerable to chosen ciphertext attacks, where an attacker can modify encrypted messages to gain information about the plaintext.

Can ElGamal encryption be used for digital signatures?

Yes, ElGamal encryption can be used for digital signatures by using the private key to sign a message and the corresponding public key to verify the signature. This provides a way to authenticate the sender of a message and ensure that the message has not been tampered with during transmission.

In what situations is ElGamal encryption used?

ElGamal encryption is commonly used in applications that require secure communication over an insecure network, such as online banking and email. It is also used in digital signature schemes and in secure multiparty computation protocols.

Similar threads

Replies
3
Views
2K
Back
Top