Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Similar documents
Attempt QUESTIONS 1 and 2, and THREE other questions. penalised if you attempt additional questions.

Public-Key Cryptosystems CHAPTER 4

CRYPTOGRAPHY AND NUMBER THEORY

Chapter 8 Public-key Cryptography and Digital Signatures

10 Modular Arithmetic and Cryptography

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Lecture Notes, Week 6

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Solution to Midterm Examination

Public Key Cryptography

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Question: Total Points: Score:

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

CIS 551 / TCOM 401 Computer and Network Security

CPSC 467b: Cryptography and Computer Security

Introduction to Modern Cryptography. Benny Chor

Lecture 1: Introduction to Public key cryptography

Math/Mthe 418/818. Review Questions

MATH3302 Cryptography Problem Set 2

Carmen s Core Concepts (Math 135)

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Number Theory and Algebra: A Brief Introduction

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Cryptography IV: Asymmetric Ciphers

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

ECE596C: Handout #11

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.

Math 299 Supplement: Modular Arithmetic Nov 8, 2013

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Practice Assignment 2 Discussion 24/02/ /02/2018

Introduction to Cryptography

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

RSA. Ramki Thurimella

Public-key Cryptography and elliptic curves

Network Security Technology Spring, 2018 Tutorial 3, Week 4 (March 23) Due Date: March 30

MATH 158 FINAL EXAM 20 DECEMBER 2016

Number theory (Chapter 4)

Cryptography. P. Danziger. Transmit...Bob...

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

Name: Mathematics 1C03

Powers in Modular Arithmetic, and RSA Public Key Cryptography

Mathematics of Cryptography

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Lecture 7: ElGamal and Discrete Logarithms

Public Key Cryptography

Classical Cryptography

Attempt QUESTIONS 1 and 2, and THREE other questions. penalised if you attempt additional questions.

Public-key Cryptography and elliptic curves

Cryptography and Security Midterm Exam

One can use elliptic curves to factor integers, although probably not RSA moduli.

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

Exercise Sheet Cryptography 1, 2011

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

Elliptic Curves. Giulia Mauri. Politecnico di Milano website:

An Introduction to Cryptography

Great Theoretical Ideas in Computer Science

5199/IOC5063 Theory of Cryptology, 2014 Fall

Math 223, Spring 2009 Final Exam Solutions

Discrete mathematics I - Number theory

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

Introduction to Cryptography. Lecture 8

The RSA cryptosystem and primality tests

Introduction to Cybersecurity Cryptography (Part 5)

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

Math 412: Number Theory Lecture 13 Applications of

Public-Key Encryption: ElGamal, RSA, Rabin

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I

Week 7 An Application to Cryptography

Linear Ciphers. Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D Mainz

8.1 Principles of Public-Key Cryptosystems

Homework Problems, Math 134, Spring 2007 (Robert Boltje)

Math.3336: Discrete Mathematics. Mathematical Induction

Public Key Encryption

Implementation Tutorial on RSA

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

Gurgen Khachatrian Martun Karapetyan

} has dimension = k rank A > 0 over F. For any vector b!

Public Key Algorithms

CPSC 467: Cryptography and Computer Security

Introduction to Modern Cryptography. Benny Chor

RSA RSA public key cryptosystem

Number Theory. Modular Arithmetic

Chapter 4 Asymmetric Cryptography

The security of RSA (part 1) The security of RSA (part 1)

Lecture V : Public Key Cryptography

Asymmetric Cryptography

Mathematical Foundations of Public-Key Cryptography

An Introduction to Probabilistic Encryption

RSA-256bit 數位電路實驗 TA: 吳柏辰. Author: Trumen

Mathematical Foundations of Cryptography

Foundations of Network and Computer Security

Number Theory & Modern Cryptography

Transcription:

UNIVERSITY OF EAST ANGLIA School of Mathematics May/June UG Examination 2010 2011 CRYPTOGRAPHY Time allowed: 2 hours Attempt THREE questions. Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used. Notes are not permitted in this examination. Do not turn over until you are told to do so by the Invigilator. Copyright of the University of East Anglia

- 2 - Note: General theorems from lectures can be used if they are stated clearly. A theorem can be used without proof unless you are required to give a proof. 1. Let n > 1 be an integer. For a, b {0,...,n 1} we set f a,b : Z/nZ Z/nZ x ax + b. (i) What is an affine permutation of Z/nZ? Show that f a,b is an affine permutation if and only if gcd(a, n) = 1. (ii) Let f a,b be an affine permutation which is not a shift transformation (i.e. a 1 mod n). (a) Prove that if n is prime then f a,b has at least one fixed point. (b) Prove that if b = 0 and n is even then f a,b has at least two fixed points. [Hint: Show first that (a 1) must be even.] (iii) We represent the 26 letters of the alphabet by the numbers 0, 1,..., 25 so that a plaintext can be seen as a sequence of residues modulo 26. (a) Define an affine substitution cipher. Describe a general method to break such a cipher. (b) Decrypt the following message which has been encrypted using an affine substitution cipher. NJINA ZD GWN ENDG (c) Alice has been told that using an affine substitution cipher is unsafe and she has therefore decided to encrypt her message twice using two different affine substitution ciphers. Does that make her message harder to decrypt? Justify your answer. [2 marks]

- 3-2. (i) (a) Define Euler s Phi function ϕ and state Euler s Theorem. (b) Let N = pq be a product of two distinct primes p and q. Explain how the RSA cryptosystem with modulus N can be broken if ϕ(n) is known. Illustrate the previous idea by factorising 9167, given that it is a product of two primes and ϕ(9167) = 8976. [5 marks] (ii) Explain briefly how the RSA system works. Give an example by encrypting the message [3,20] using the public key (65, 5) and by decrypting it. [8 marks] (iii) Let n = pq be a product of two distinct primes. Let y, d {0,...,n 1} and assume that gcd(y, n) = 1. Let d p d mod p 1 and d q d mod q 1. Let M p q 1 mod p and M q p 1 mod q. Finally we set x p y dp mod p, x q y dq mod q, x M p qx p + M q px q mod n. Using the Chinese Remainder Theorem, show that x y d mod n. Explain briefly why this can be used to speed up the computation of y d mod n. PLEASE TURN OVER

- 4-3. (i) Let n > 1 be an integer and let p be a prime number. (a) Let a be an integer coprime to n. Define what is meant by the order of a modulo n. What is a primitive root modulo p? How many primitive roots modulo p are there? (You do not need to justify your answer.) (b) Show that 3 is a primitive root modulo 19, and draw up a table giving the values of log 3,19 (a) for all nonzero residues a modulo 19. (c) Let b be a primitive root modulo p. Show that the set {b 0,...,b p 2 } is a reduced system of residues modulo p. (ii) State the Diffie-Hellman problem and explain how this problem can be used to exchange keys over an insecure channel. [8 marks]

- 5-4. The Secret Society of SilverSmiths encrypts messages as follows. They use a 29-letter alphabet in which A Z have numerical equivalents 0 25, space=26,?=27 and!=28. Thus each message is identified with a sequence of residues mod 29. Adding a space at the end if necessary we can assume that each plaintext has the form a 1 a 2... a 2k 1 a 2k. The encryption key is an invertible two by two matrix ( ) a b A = M c d 2 (Z/29Z). The message sender computes ( t2i 1 t 2i ) = ( ) ( a b a2i 1 c d a 2i for each i from 1 to k and then obtains the ciphertext as the alphabetical equivalent ) of b 1 b 2...b 2k 1 b 2k where b i t i mod 29. ( ) 0 5 (i) Assume that the encryption key is 11 1 (a) What is the ciphertext for FRIDAY?. (b) Decrypt the message MBPBEY (in plain english). [6 marks] (ii) Why is it important that the matrix A is invertible? Explain why is it important to have many different encryption keys. (iii) Let p be a prime number. Find the number of invertible matrices modulo Z/pZ in the following two ways and check that your answers agree: Count the number of matrices B M 2 (Z/pZ) such that det(b) 0 mod p and subtract this number from the number of elements in M 2 (Z/pZ). Use linear algebra over the finite field Z/pZ. How many different keys are there in the SilverSmiths cryptosystem? [7 marks] END OF PAPER