New Example | Restart |
Eve knows: | |||
Alice knows | Bob: Key Generation | Bob chooses p | Bob knows |
---|---|---|---|
Bob chooses g | |||
Bob chooses b | |||
Bob computes B=gb⊗ |
|||
Bob publishes his public key (p,g,B) | |||
Public key directory. . | |||
Alice wants to send Bob the secret message m | |||
Alice gets (p,g,B) from public key directory |
Alice: Encryption | ||
Alice chooses a | |||
Alice computes A=ga⊗ |
|||
Alice computes s=Ba⊗ |
|||
Alice encrypts m as X=m⊗s |
|||
Alice sends (A,X) | Bob receives (A,X) | ||
Bob: Decryption |
Bob computes s=Ab⊗ |
||
Bob finds s-1⊗ with s⊗s-1⊗=1 |
|||
Bob decrypts X to m=X⊗s-1⊗ |