Sunday, November 1, 2009

Section 7.3-7.5, due Novemeber 2

I think that it is kind of cool that we can use discrete logs for other things besides sending messages. I think that bit commitment is close to the same thing if Alice sent Bob her secret p and q, the factorization of n. He could then decrypt he message she had sent previously.

ElGamal makes sense mathematically but it might take a bit to remember how to use it. The key used in it is a lot different than RSA. Then again, the algorithm has a lot of similarities and also a lot of differences.

No comments:

Post a Comment