This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An ElGamal-Like Cryptosystem for Enciphering Large Messages
March/April 2002 (vol. 14 no. 2)
pp. 445-446

In practice, we usually require two cryptosystems, an asymmetric one and a symmetric one, to encrypt a large confidential message. The asymmetric cryptosystem is used to deliver secret key $SK$, while the symmetric cryptosystem is used to encrypt a large confidential message with the secret key $SK$. In this article, we propose a simple cryptosystem which allows a large confidential message to be encrypted efficiently. Our scheme is based on the Diffie-Hellman distribution scheme, together with the ElGamal cryptosystem.

[1] D.E.R. Denning, Cryptography and Data Security. Addison-Wesley, 1983.
[2] W. Diffie and M.E. Hellman, New Directions in Cryptography IEEE Trans. Information Theory, vol. 22, pp. 644-654, 1976.
[3] T. ElGamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
[4] R.C. Merkle and M.E. Hellman, Hiding Information and Signatures in Trapdoor Knapsack IEEE Trans. Information Theory, vol. 24, no. 5, pp. 525-530, Sept. 1978.
[5] S. Miyaguchi, ”The FEAL Cipher Family,” Proc. CRYPTO '90, vol. 435, pp. 727-638 Aug. 1990.
[6] National Bureau of Standard. “Data Encryption Standard,” Federal Information Processing Standards, NBS, 1977.
[7] R.L. Rivest,A. Shamir, and L.A. Adleman,"A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Comm. ACM, vol. 21, pp. 120-126, 1978.
[8] B. Schneier, Applied Cryptography. New York: John Wiley, 1994.
[9] M.E. Smid and D.K. Branstad, ”The Data Encryption Standard: Past and Future,” Proc. IEEE, vol. 76, no. 5, pp. 550-559, May 1988.

Index Terms:
cryptosystems, data security, encryption, public key
Citation:
M.S. Hwang, C.C. Chang, K.F. Hwang, "An ElGamal-Like Cryptosystem for Enciphering Large Messages," IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp. 445-446, March-April 2002, doi:10.1109/69.991728
Usage of this product signifies your acceptance of the Terms of Use.