section-engineering-education / engineering-education

“Section's Engineering Education (EngEd) Program is dedicated to offering a unique quality community experience for computer science university students."
Apache License 2.0
364 stars 890 forks source link

ASYMMETRIC ENCRYPTION #3722

Closed njerigitahi closed 2 years ago

njerigitahi commented 3 years ago

Proposed title of the article

DHKE and ElGamal algorithm in asymmetric encryptions*

Introduction paragraph (2-3 paragraphs):

Computer security: involves maintaining integrity, availability, and confidentiality of information system resources. Can be done using encryption. Encryption involves enciphering data in transit and using the private keys by authorized personnel to access it. It may be of two types: Symmetric- use one key Asymmetric- use two keys a good example of a key generation algorithm is DHKE used in algorithms such as *ElGamal.

Key takeaways:

  1. Understand asymmetric encryption.
  2. Gain basic knowledge on modular exponential
  3. Finding modular exponential in python
  4. Working of DHKE protocol
  5. Application of DHKE in ElGamal

References:

N/A

Templates to use as guides

WanjaMIKE commented 3 years ago

Good afternoon and thank you for submitting your topic suggestion. @njerigitahi Your topic form has been entered into our queue and should be reviewed (for approval) as soon as a content moderator is finished reviewing the ones in the queue before it.

hectorkambow commented 3 years ago

👋
How will this article differ from what is published our other blog sites

njerigitahi commented 3 years ago

Am majorly dealing with the understanding of the Diffie Helman Key Generation process while examples for clarity. In addition, I'll also explain how the Elgamal algorithm uses DHKE to generate keys and it's encryption and decryption process. I will briefly explain modula exponential and a code in python to generate it. This is because modula exponential is used in Elgamal during descryption to generate key inverse. This has not been handled in other sites. @WanjaMIKE

ahmadmardeni1 commented 3 years ago

Sounds like a helpful topic - let's please be sure it adds value beyond what is in any official docs and/or what is covered in other blog sites. (the articles should go beyond a basic explanation - and it is always best to reference any EngEd article and build upon it).

Please be attentive to grammar/readability and make sure that you put your article through a thorough editing review prior to submitting it for final approval. (There are some great free tools that we reference in EngEd resources.) ANY ARTICLE SUBMITTED WITH GLARING ERRORS WILL BE IMMEDIATELY CLOSED.

Please be sure to double-check that it does not overlap with any existing EngEd articles, articles on other blog sites, or any incoming EngEd topic suggestions (if you haven't already) to avoid any potential article closure, please reference any relevant EngEd articles in yours. - Approved @njerigitahi

njerigitahi commented 3 years ago

@louisefindlay23 I have removed the backticks from the line