In Why Textbook ElGamal and RSA Encryption are Insecure by Boneh, Joux, and Nguyen, several algorithms for attacking the plain ElGamal public-key cryptosystem are described. In this paper I explore the implementation in more detail and discuss the relative efficiency of different approaches. I also explore the use of external storage to reduce the memory requirements and allow the attacks to be run on larger messages. |