ТОП просматриваемых книг сайта:
Security Engineering. Ross Anderson
Читать онлайн.Название Security Engineering
Год выпуска 0
isbn 9781119642817
Автор произведения Ross Anderson
Жанр Зарубежная компьютерная литература
Издательство John Wiley & Sons Limited
Figure 5.17: Example of discrete logarithm calculations
5.7.2.1 One-way commutative encryption
Imagine we're back in ancient Rome, that Anthony wants to send a secret to Brutus, and the only communications channel available is an untrustworthy courier (say, a slave belonging to Caesar). Anthony can take the message, put it in a box, padlock it, and get the courier to take it to Brutus. Brutus could then put his own padlock on it too, and have it taken back to Anthony. He in turn would remove his padlock, and have it taken back to Brutus, who would now at last open it.
Exactly the same can be done using a suitable encryption function that commutes, that is, has the property that
How can a suitable commutative encryption be implemented? The one-time pad does indeed commute, but is not suitable here. Suppose Alice chooses a random key
The discrete logarithm problem comes to the rescue. If the discrete log problem based on a primitive root modulo
5.7.2.2 Diffie-Hellman key establishment
The first public-key encryption scheme to be published, by Whitfield Diffie and Martin Hellman in 1976, has a fixed primitive root
Let's walk through this. The prime