logo

ZiffurComputers and stuff, made simple.

The ElGamal Encryption

The ElGamal Encryption is an asymmetric key encryption which means it uses public and private keys. The public key is ment to encrypt a message and the private key can then be used to decrypt it again. The choice of these keys is based on the pulic key system of the Diffie-Hellman key exchange.

The alorithm is prooven to be IND-CPA secure under the assumption that the Diffie-Hellman problem (the solving of the discrete logarithm) is nearly impossible

The Diffie-Hellman Key Exchange

The Diffie-Hellman Key Exchange is one of the first widely used algorithms to exchange keys publicly. That raises two questions: What is a key exchange? and Why would you do that publicly?.

Let's start with the first one. Some information, e.g. private messages or corporate secrets, are not meant to be accessible by everyone. To ensure that only certain people (or machines) can read this kind of information, one can use various cryptographic systems. These systems allow two or more par

How can I Recognize a Phishing E-Mail?

Phishing is the type of cyber attack that can hit anyone anywhere at any time. But if that is true, is there a way we can protect us against such attacks? How can we recognize a mail as phishing?

As you might have guessed, there is no cookie-cutter recipe on how to recognize phishing. However, there are a few checkpoints by which we can categorize an e-mail as "likely phishing" and then carefully read and process it.

In this article we will take a closer look at suspicious signs in an e-mail

What is Phishing?

[Phishing is] an attempt to trick someone into giving information over the internet or by e-mail that would allow someone else to take money from them, for example by taking money out of their bank account.

— Cambridge Dictionary

The Cambridge Dictionary gives a rather vague definition for a complex topic such as phishing but let's have a closer look at the quote above.

Phishing is indeed an attempt to trick someone into giving information to someone else (who we'll call a