On Monday, September 11, 2017 at 10:01:41 PM UTC-4, Derek Cole wrote:
>
> Hello,
>
> I have been trying to learn ElGamal encryption by way of this site:
>
> https://cryptographyacademy.com/elgamal/
>
> I am able to find the SubgroupOrder, SubgroupGenerator, and Modulus of an 
> ElGamalKeys::PublicKey, but I am unable to find the 3rd parameter of the 
> PublicKey which is computed using Alice's private exponent. According to 
> the site:
>
>  Next Alice chooses the secret key sk=a between 1 and p−1 and computes 
>> A=g^a mod p
>>
> Alice then publish the public key pk=(p,g,A). 
>>
>
> So how do I find the A parameter from the PublicKey?
>

I believe A is a domain parameter. Alice and Bob have to agree to use them 
before any instance of a protocol is run.

The equivalent problem in elliptic curves is, how do you know which field 
you are working in. That's why you have named curves like NIST P-256. The 
name P-256 conveys the domain parameters we need to execute an instance of 
the protocol.

My apologies if I mis-parsed the question.

Jeff

-- 
-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to cryptopp-users-unsubscr...@googlegroups.com.
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cryptopp-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to