26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

178 INTERNET SECURITY<br />

The ElGamal authentication scheme is shown in Figure 5.6. The ElGamal authentication<br />

algorithm given in Table 5.7 is illustrated by the following example.<br />

Example 5.10 Take the finite field GF(11). Then the set of primitive elements of GF(11)<br />

is {2, 6, 7, 8}. Choose a primitive element g = 7 from the set. Define the public key<br />

m<br />

Private<br />

key<br />

x<br />

gx<br />

g<br />

u ≡ g m (mod p)<br />

(g x ) u<br />

Extended<br />

euclidean<br />

algorithm<br />

c ≡ xu + mv<br />

v<br />

u v<br />

c<br />

c − xu<br />

Inverse<br />

v −1<br />

A ≡ (g x ) u u v (mod p)<br />

Figure 5.6 The ElGamal authentication scheme.<br />

Table 5.7 ElGamal authentication algorithm<br />

Sender<br />

Receiver<br />

Verifying:<br />

p (a prime integer)<br />

g

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!