A new approach to the ElGamal encryption scheme
Kościelny, Czesław
International Journal of Applied Mathematics and Computer Science, Tome 14 (2004), p. 265-267 / Harvested from The Polish Digital Mathematics Library

The ElGamal encryption scheme can be used for both digital signatures and encryption, and its security results from the difficulty of calculating discrete logarithms in a finite field. This algorithm usually works in a multiplicative group of GF(p) and in this case the progress in the discrete logarithm problem forces the users of such a basic ElGamal public key cryptosystem to permanently increase a prime modulus p in order to ensure the desired security. But the task of finding a multiplicative group of GF(p) is unfeasible for an ordinary user. It is possible to overcome this inconvenience by forming an ElGamal encryption scheme which works in a multiplicative group of GF(p^m). Therefore, it is shown in the paper how to implement this cryptosystem for work in the multiplicative group of GF(pm), in its subgroup, and in an algebraic system named the spurious multiplicative group of GF(p^m).

Publié le : 2004-01-01
EUDML-ID : urn:eudml:doc:207697
@article{bwmeta1.element.bwnjournal-article-amcv14i2p265bwm,
     author = {Ko\'scielny, Czes\l aw},
     title = {A new approach to the ElGamal encryption scheme},
     journal = {International Journal of Applied Mathematics and Computer Science},
     volume = {14},
     year = {2004},
     pages = {265-267},
     zbl = {1088.94017},
     language = {en},
     url = {http://dml.mathdoc.fr/item/bwmeta1.element.bwnjournal-article-amcv14i2p265bwm}
}
Kościelny, Czesław. A new approach to the ElGamal encryption scheme. International Journal of Applied Mathematics and Computer Science, Tome 14 (2004) pp. 265-267. http://gdmltest.u-ga.fr/item/bwmeta1.element.bwnjournal-article-amcv14i2p265bwm/

[000] Kościelny C. (2003): User-friendly ElGamal public-key encrypt-letter scheme. - http://www.mapleapps.com/List.asp?CategoryID=6&Category=Cryptography

[001] Menezes A.J., van Oorschot P.C. and Vanstone S.A. (1998): Handbook of Applied Cryptography. - Boca Raton: CRC Press.

[002] Stinson D.R. (1995): Cryptography - Theory and Practice. - Boca Raton: CRC Press. | Zbl 0855.94001

[003] Živković M. (1994): Table of primitive binary polynomials, Part II. - Math. Comput., Vol. 63, No. 207, pp. 301-306. | Zbl 0807.11055