How can we find the decrypted message?

  • MHB
  • Thread starter mathmari
  • Start date
In summary, the conversation discusses the encryption system of ElGamal, where $A$ uses a public key of $(p, g, y)=(53, 2, 27)$ and $B$ sends an encrypted message of $(15, 34)$. The original message can be found by calculating $m=\frac{c}{r^a}=\frac{34}{15^a}$, but the private key of $A$ is needed. The conversation also mentions the relationship between the public and private keys in the ElGamal cryptosystem.
  • #1
mathmari
Gold Member
MHB
5,049
7
Hey! :eek:

Let's suppose that $A$ uses the encryption system of ElGamal with with public key $(p, g, y)=(53, 2, 27)$. $B$ sends to $A$ the encrypted message $(15, 34)$. Find the original message.

We have that $r=15, y=g^a, y^k=g^{ak}=r^a, c=m \cdot y^k=34$.

$$m=\frac{c}{r^a}=\frac{34}{15^a}$$

How can we continue?? (Wondering)

We are not given the private key of $A$, are we??

So, is the answer a function of $a$??
 
Mathematics news on Phys.org
  • #2
mathmari said:
Hey! :eek:

Let's suppose that $A$ uses the encryption system of ElGamal with with public key $(p, g, y)=(53, 2, 27)$. $B$ sends to $A$ the encrypted message $(15, 34)$. Find the original message.

We have that $r=15, y=g^a, y^k=g^{ak}=r^a, c=m \cdot y^k=34$.

$$m=\frac{c}{r^a}=\frac{34}{15^a}$$

How can we continue?? (Wondering)

We are not given the private key of $A$, are we??

So, is the answer a function of $a$??

Hi mathmari,

The ElGamal cryptosystem as all other public key cryptosystems has a relationship between the public key and the private key. Note that,

\[27=y=g^x=2^x\mbox{ (mod }53)\]

We can calculate the value of $x$ which is the secret key. Although in practice the values will be larger and calculating the discrete logarithms are hard.
 

1. What is decryption?

Decryption is the process of converting an encrypted message or data into its original form using a specific algorithm or key.

2. How can we decrypt a message?

To decrypt a message, we need the correct decryption key or algorithm. This can be obtained from the sender of the message or through a process of trial and error.

3. Is it possible to decrypt any message?

No, not all messages can be decrypted. Some encryption methods use extremely complex algorithms and keys that are nearly impossible to crack.

4. Can we decrypt a message without the key?

In most cases, no. The key is necessary for decrypting the message and without it, the message will remain encrypted and unreadable.

5. Are there any tools or software that can help with decryption?

Yes, there are various tools and software available that can assist with decryption. However, they may not always be effective and may require the correct key or algorithm to be successful.

Similar threads

  • General Math
Replies
1
Views
2K
  • General Math
Replies
3
Views
2K
Replies
1
Views
2K
  • Set Theory, Logic, Probability, Statistics
Replies
2
Views
670
  • Computing and Technology
Replies
8
Views
1K
Replies
2
Views
1K
Replies
3
Views
2K
Replies
7
Views
1K
Replies
5
Views
2K
Replies
4
Views
2K
Back
Top