Score:0

Why is it hard to compute $g^{xy}\bmod p$ from $g^x\bmod p$ and $g^y\bmod p$?

sa flag

Why is it hard to compute $$(g^x\bmod p, g^y\bmod p) \longmapsto g^{xy}\bmod p $$ when can we quickly compute $$x \longmapsto g^x\bmod p$$ ?

kelalaka avatar
in flag
Does this answer your question? [What is the relation between Discrete Log, Computational Diffie-Hellman and Decisional Diffie-Hellman?](https://crypto.stackexchange.com/questions/1493/what-is-the-relation-between-discrete-log-computational-diffie-hellman-and-deci) and [Discrete Logarithm: Given a p, what does it mean to find the discrete logarithm of x to base y?](https://crypto.stackexchange.com/q/76230/18298)
fgrieu avatar
ng flag
The present question is not really a dupe of [this question](https://crypto.stackexchange.com/q/1493/555), but the later's [accepted answer](https://crypto.stackexchange.com/a/1498/555) covers the present question to a large degree. Short answer: because we do not know an efficient method. Fact: one method would be to find $x$ and use $g^{xy}\bmod p\ =\ (g^y\bmod p)^x\bmod p$, but we do not know an efficient method to compute $x$ from $g^x\bmod p$.
Score:-3
de flag

I believe you are asking a question about DH exchanging key protocol. In DH, A creates a random private key of x and then will send the mod to B.
so nobody knows the X, although everyone can see the mod they cannot get the x from it, because of DLP (Discrete Logarithm Problem).

cn flag
This does not answer the question.
Maarten Bodewes avatar
in flag
A bit more going into depth would have helped here, you could have explained that you'd need $x$ to calculate $(g^x\bmod p, g^y\bmod p) \longmapsto g^{xy}\bmod p$ I suppose. As it stands, just saying that DH is considered secure because of DLP doesn't really touch the question at hand. That said, a bit more direction could have helped instead of just downvotes and negative comments.
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.