Making a Ring

--

There was a time before I understood rings in public key methods, and the time after it. I basically allowed me to understand how public key encryption and discrete logs work. Basically, I take a prime number (p), and then use a (mod p) operation, and it creates a ring.

For a ring in encryption, we create can a g value and have a prime number of N. For values of x, we get g^ x (mod N). For example if we use g=2 and N=42:

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.