IS Theory
IS Theory
IS Theory
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
Plaintext: the quick brown fox jumps over the lazy dog
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ
W . . . E . . . C . . . R . . . L . . . T . . . E
. E . R . D . S . O . E . E . F . E . A . O . C .
. . A . . . I . . . V . . . D . . . E . . . N . .
Decrypting messages
Alice can recover from by using her private key
exponent by the following computation:
Key Schedule
DIFFIE HELLMAN KEY EXCHANGE
1. Alice and Bob agree to use a prime number p=23 and base g=5.
2. Alice chooses a secret integer a=6, then sends Bob (ga mod
p)
56 mod 23 = 8.
3. Bob chooses a secret integer b=15, then sends Alice (gb mod
p)
515 mod 23 = 19.
4. Alice computes (gb mod p)a mod p
196 mod 23 = 2.
5. Bob computes (ga mod p)b mod p
815 mod 23 = 2.
6 3 2 4 1 5
W E A R E D
I S C O V E
R E D F L E
E A T O N C
E Q K J E U
6 3 2 4 1 5
W E A R E D
I S C O V E
R E D F L E
E A T O N C
E