From 816eab76356c356ddb79c559719f1aa16ed6f6c9 Mon Sep 17 00:00:00 2001 From: Andre Henriques Date: Tue, 7 Nov 2023 21:43:56 +0000 Subject: [PATCH] fix spelling --- cw/cw.tex | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cw/cw.tex b/cw/cw.tex index aa7b578..7e19c31 100644 --- a/cw/cw.tex +++ b/cw/cw.tex @@ -238,7 +238,7 @@ While for ElGamal you need to exchange information only twice, once to exchange public keys and the second to exchange the encrypted message \subsubsection*{6.3.4} If the discrite logarithm problem is easy to solve then Elgamal is also easy to solve. While for this case the being able to solve the discrite logarithm problem does not help an attacker with breaking the algorithm because the attacker only knows the result of the exponenciation and does not know the value of the base which is publicly known with Elgamal. - The Diffle-Hellman problem also does not apply since that problem rellies on. if we know $g^x$ and $g^y$ being able to figure out $g^{xy}$ but on this case the problem is slightly different. Is being able to figure out $g^x^y$. + The Diffle-Hellman problem also does not apply since that problem rellies on. if we know $g^x$ and $g^y$ being able to figure out $g^{xy}$ but on this case the problem is slightly different. Is being able to figure out $(g^x)^y$. Therefore this problem does not depend on the discrite logarithm problem