0

Why is it hard to compute $$(g^x\bmod p, g^y\bmod p) \longmapsto g^{xy}\bmod p $$ when can we quickly compute $$x \longmapsto g^x\bmod p$$ ?

fgrieu
  • 140,762
  • 12
  • 307
  • 587

1 Answers1

-3

I believe you are asking a question about DH exchanging key protocol. In DH, A creates a random private key of x and then will send the mod to B.
so nobody knows the X, although everyone can see the mod they cannot get the x from it, because of DLP (Discrete Logarithm Problem).

Hedeesa
  • 43
  • 2
  • 1
    This does not answer the question. – Maeher Dec 09 '21 at 19:47
  • A bit more going into depth would have helped here, you could have explained that you'd need $x$ to calculate $(g^x\bmod p, g^y\bmod p) \longmapsto g^{xy}\bmod p$ I suppose. As it stands, just saying that DH is considered secure because of DLP doesn't really touch the question at hand. That said, a bit more direction could have helped instead of just downvotes and negative comments. – Maarten Bodewes Dec 10 '21 at 22:53