You're Eve. Bob has made it public that he is using ElGamal, p = 29, g = 2, and his public key is 28. You intercept the following message: (9, 5), (16, 12), (28, 5), (1, 13), (20, 5), (23, 14), (20, 20), (1, 1), (13, 18), (22, 25). Decrypt the message by hand. Did you get Bob's private key (to get the best solution, you don't have to!)? Hints: Why 29? Also, what $c_1^α$ are possible? So far, I've only been able to tell that Bob (I think) is the one receiving the messages since he has a public and private key, as opposed to the sender who would only have one private (ephemeral) key.
2026-03-28 04:52:17.1774673537
Decrypting ElGamal messages
385 Views Asked by user138491 https://math.techqa.club/user/user138491/detail At
1
There are 1 best solutions below
Related Questions in CRYPTOGRAPHY
- What exactly is the definition of Carmichael numbers?
- What if Eve knows the value of $S$ in digital signiture?
- Relative prime message in RSA encryption.
- Encryption with $|K| = |P| = |C| = 1$ is perfectly secure?
- Cryptocurrency Math
- DLP Relationship of primitive roots $\pmod{p}$ with $p$ and $g$
- Hints to prove $2^{(p−1)/2}$ is congruent to 1 (mod p) or p-1 (mod p)
- Period of a binary sequence
- generating function / stream cipher
- RSA, cryptography
Trending Questions
- Induction on the number of equations
- How to convince a math teacher of this simple and obvious fact?
- Find $E[XY|Y+Z=1 ]$
- Refuting the Anti-Cantor Cranks
- What are imaginary numbers?
- Determine the adjoint of $\tilde Q(x)$ for $\tilde Q(x)u:=(Qu)(x)$ where $Q:U→L^2(Ω,ℝ^d$ is a Hilbert-Schmidt operator and $U$ is a Hilbert space
- Why does this innovative method of subtraction from a third grader always work?
- How do we know that the number $1$ is not equal to the number $-1$?
- What are the Implications of having VΩ as a model for a theory?
- Defining a Galois Field based on primitive element versus polynomial?
- Can't find the relationship between two columns of numbers. Please Help
- Is computer science a branch of mathematics?
- Is there a bijection of $\mathbb{R}^n$ with itself such that the forward map is connected but the inverse is not?
- Identification of a quadrilateral as a trapezoid, rectangle, or square
- Generator of inertia group in function field extension
Popular # Hahtags
second-order-logic
numerical-methods
puzzle
logic
probability
number-theory
winding-number
real-analysis
integration
calculus
complex-analysis
sequences-and-series
proof-writing
set-theory
functions
homotopy-theory
elementary-number-theory
ordinary-differential-equations
circles
derivatives
game-theory
definite-integrals
elementary-set-theory
limits
multivariable-calculus
geometry
algebraic-number-theory
proof-verification
partial-derivative
algebra-precalculus
Popular Questions
- What is the integral of 1/x?
- How many squares actually ARE in this picture? Is this a trick question with no right answer?
- Is a matrix multiplied with its transpose something special?
- What is the difference between independent and mutually exclusive events?
- Visually stunning math concepts which are easy to explain
- taylor series of $\ln(1+x)$?
- How to tell if a set of vectors spans a space?
- Calculus question taking derivative to find horizontal tangent line
- How to determine if a function is one-to-one?
- Determine if vectors are linearly independent
- What does it mean to have a determinant equal to zero?
- Is this Batman equation for real?
- How to find perpendicular vector to another vector?
- How to find mean and median from histogram
- How many sides does a circle have?
I assume the encoding is $a=1,b=2$ etc. (only invertible elements (so non-zero) of $\Bbb Z_p$ are allowed).
Note that the public key $g^s=28$ is just $-1$ modulo $29$ ! A message letter $m$ is encrypted as the pair $c=(g^r, g^{rs}m)$ for some random $r \in \Bbb Z_p$. Note that $g^{rs}=(g^s)^r = (-1)^r$, so the multiplication factor in the $c_2$ is either $1$ or $-1$.
So the pairs are $$(9, 5), (16, 12), (28, 5), (1, 13), (20, 5), (23, 14), (20, 20), (1, 1), (13, 18), (22, 25)$$ which have second components
$$5,12,5,13,5,14,20,1,18,25 = e,l,e,m,e,n,t,a,r,y$$
in my supposed encoding. It seems that all factors were 1.
Of course, the public key is awful here (the private key is $\frac{p-1}{2}=14$ if you want to know, but we don't really need it). This whole system is just a bad substitution cipher: you're better off just encoding a random permutation of the alphabet somehow. For real life El-Gamal you need a huge prime (1024 bits or more is recommended) and a good generator, and then you encrypt a symmetric key with it, say and use AES for actual messages. IMHO these kind of exercises on PK-cryptography don't really teach you anything...