Professional Documents
Culture Documents
ElGamal Encryption Algoritham
ElGamal Encryption Algoritham
By →
Name :- Arvind Bishnoi
Roll no :- 19107
Branch :- CSE ( VIIth SEM )
Introduction of ElGamal Encryption Algo.
1. ElGamal encryption is a public-key cryptosystem
1. Key Generation
2. Encryption
3. Decryption
Step 1 : Key Generation
Suppose :
1. P=11 , D=3, E1=2
2. Then E2= 23 mod 11=8
3. Public key=( 2, 8, 11) & Private key= 3.
Step 2 : Encryption
Continuous :-
1. R=4, C1=24 mod 11=5, PT=7
2. C2=( 7 x 84) mod 11=6
3. C.T. = (5,6)
Step 3 : Decryption
Continuous :-
● PT= (6 x ( 53 ) -1 ) mod 11
= 18 mod 11 = 7
Example of ElGamal Algo
Case Study :- Maersk Not petya Ransomware attack
Introduction
● In 2017 Maersk was impacted by Not-Petya ransomware attack
and their network was down for a whole 9 days.
● Second penetration tool known as Mimikatz :- In 2011 French security researcher Benjamin
Delpy developed it as a proof of concept. Delpy originally released Mimikatz to demonstrate
how Windows stored users' passwords in computer memory. Mimikatz could pull passwords
from RAM after hackers gained initial access to a computer and use them to hack into other
machines accessible with the same credentials. It could even allow an automated attack to
hopscotch from one machine to the next on networks with multi user computers.
Recovery of Systems
● An incident response team was assembled, and an
emergency recovery center was put together in Great
Britain to mitigate and recover from the NotPetya attack.
Company Cost