1
24kviews
| written 7.1 years ago by |
EI- Gamal Cryptography
EI gamal cryptography works in 3 steps/stages
$\hspace{1.5cm}$a. Key generation
$\hspace{1.5cm}$b. EI gamal encryption
$\hspace{1.5cm}$c. EI gamal decryption

A. EI gamal key generation:
Select a large prime number ‘p’
Select encryption key $‘e_1’$ to be primitive root of mod p
Select decryption key ‘d’ such that $1≤d≤p-2$ …