1 00:00:01,190 --> 00:00:07,160 As we mentioned the other popular asymmetric encryption algorithm is El-Gamal. 2 00:00:07,270 --> 00:00:15,500 It was developed by an Egyptian cryptographer TR El-Gamal in the 80s after RSA generation is also the 3 00:00:15,500 --> 00:00:19,600 most vital step for El-Gamal. 4 00:00:19,670 --> 00:00:23,370 You have to select a large prime number P.. 5 00:00:23,530 --> 00:00:29,670 Then pick a random gene that satisfies the inequality G less than P2. 6 00:00:31,230 --> 00:00:36,870 If the public and private Keep may be used interchangeably in RSA there's no such correlation in this 7 00:00:36,870 --> 00:00:37,760 algorithm. 8 00:00:39,450 --> 00:00:46,680 This results in the fact that the values P and G can be shared by many users in a system next. 9 00:00:46,680 --> 00:00:49,200 Pick a random value x that is smaller than P 10 00:00:52,240 --> 00:00:59,020 that and compute equation y equals G mod p. 11 00:00:59,210 --> 00:01:03,380 The values PGE in y will be in your public key. 12 00:01:03,380 --> 00:01:05,510 While the value X will be the private key 13 00:01:10,660 --> 00:01:12,340 to encrypt the plaintext. 14 00:01:12,670 --> 00:01:16,420 Pick any coprime integer k from the range up to p minus one 15 00:01:19,300 --> 00:01:19,830 next. 16 00:01:19,870 --> 00:01:21,790 Compute the following equation. 17 00:01:22,300 --> 00:01:27,840 The ciphertext will be the value pair r and s. 18 00:01:28,030 --> 00:01:28,770 The security of. 19 00:01:28,770 --> 00:01:35,300 El-Gamal algorithm is less controversial than the security of RSA. 20 00:01:35,310 --> 00:01:40,080 It does seem that calculating a discrete logarithm is indeed computationally difficult. 21 00:01:41,480 --> 00:01:49,110 You can now encrypt the plaintext but encryption only serves to ensure data confidentiality. 22 00:01:49,230 --> 00:01:55,860 It doesn't lead to a protection or establishing data authenticity authenticity can be as relevant as 23 00:01:56,340 --> 00:02:03,460 or perhaps even more vital than confidentiality some other solution has to be used in that case.