Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Similar documents
University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

MATH 158 FINAL EXAM 20 DECEMBER 2016

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

Practice Assignment 2 Discussion 24/02/ /02/2018

Classical Cryptography

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

Question: Total Points: Score:

CPSC 467b: Cryptography and Computer Security

Public Key Cryptography

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

CRYPTOGRAPHY AND NUMBER THEORY

Public-Key Cryptosystems CHAPTER 4

RSA RSA public key cryptosystem

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Solutions to the Midterm Test (March 5, 2011)

Introduction to Cryptology. Lecture 2

Math 223, Spring 2009 Final Exam Solutions

Week 7 An Application to Cryptography

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Chapter 8 Public-key Cryptography and Digital Signatures

Cryptography and Security Midterm Exam

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Real scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm. David Morgan

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Polyalphabetic Ciphers

Introduction to Modern Cryptography. Benny Chor

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Lecture Notes, Week 6

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Cryptography. P. Danziger. Transmit...Bob...

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Cook-Levin Theorem. SAT is NP-complete

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018

Homework 4 for Modular Arithmetic: The RSA Cipher

5. Classical Cryptographic Techniques from modular arithmetic perspective

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

Network Security Technology Spring, 2018 Tutorial 3, Week 4 (March 23) Due Date: March 30

An Introduction to Cryptography

Ma/CS 6a Class 1. Course Details

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Security of Networks (12) Exercises

Solution to Midterm Examination

Cryptography and Security Final Exam

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

CIS 551 / TCOM 401 Computer and Network Security

Implementation Tutorial on RSA

Lecture V : Public Key Cryptography

10 Modular Arithmetic and Cryptography

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

ENEE 457: Computer Systems Security 10/3/16. Lecture 9 RSA Encryption and Diffie-Helmann Key Exchange

CPSC 467b: Cryptography and Computer Security

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.

Simple Codes MTH 440

Discrete Mathematics GCD, LCM, RSA Algorithm

CSCI3381-Cryptography

Encryption: The RSA Public Key Cipher

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

Lecture 1: Introduction to Public key cryptography

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

ECS 189A Final Cryptography Spring 2011

Public Key Cryptography

MATH3302 Cryptography Problem Set 2

Chapter 4 Asymmetric Cryptography

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER

Asymmetric Cryptography

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Notes 10: Public-key cryptography

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Public Key Encryption

CPSC 467: Cryptography and Computer Security

My brief introduction to cryptography

Elliptic Curves. Giulia Mauri. Politecnico di Milano website:

Exam Security January 19, :30 11:30

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

Carmen s Core Concepts (Math 135)

Public-key Cryptography and elliptic curves

CPSC 467b: Cryptography and Computer Security

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Number Theory & Modern Cryptography

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

RSA. Ramki Thurimella

Topics in Cryptography. Lecture 5: Basic Number Theory

Ma/CS 6a Class 3: The RSA Algorithm

Number theory (Chapter 4)

Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians!

Introduction to Cryptography. Lecture 6

} has dimension = k rank A > 0 over F. For any vector b!

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Mathematics of Cryptography

Discrete mathematics I - Number theory

Transcription:

Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show your work. A correct answer with no work shown may not receive full credit. Start each numbered question on a new page. Unless otherwise indicated, use your calculator only to do basic arithmetic and function evaluation. Turn in your test sheets along with those containing your work. 1. (1 points) For each of the following indicate whether the statement is true or false. (a) If the greatest common divisor of integers a and b is 1, then either a or b is prime. (b) A scytale is a device that implements a type of polyalphabetic substitution. (c) A principle of cryptography is that the security of a ciphersystem resides in the key information. (d) In a substitution cipher, the letters in the plaintext message are rearranged. (e) If Alice and Bob have exchanged a great deal of Vigenère key data and they use this method, alway using a key as long as the plaintext and never re-using a key, then Eve, attempting a ciphertext-only attack and knowing that the underlying plaintext is English, will do no better than guessing at the plaintext. (f) If an English plaintext is enciphered using the Vigenère method with a long random keyword, then the index of coincidence of the resulting ciphertext will be close to 1/2. (g) A -bit linear shift register generates a sequence of 0 s and 1 s that never repeats. (h) In any sample of ordinary English text, the letter E will be the most frequent.

(i) If an efficient method for factoring very large numbers is found, then RSA would no longer be a secure means of encryption. (j) The number with base twenty-six representation EXAM is. (k) A principle of cryptography is that the security of a cipher system rests on keeping the method of encipherment secret. (l) 09 20 (mod 09). (m) RSA has been proven unbreakable. (n) Public key cryptosystems tend to run on computers more slowly than secret-key systems. 2. ( points ) Decipher NOCJUT, which was enciphered with the affine encipherment function E(x) =(21x + 1)mod 2.. ( points) Decipher [ FCUWP, ] which was enciphered using the Hill cipher 11 1 matrix A =. 12 1. ( points ) Decipher TETST WTUEA HTEOU RTRRA OBTON U, which was enciphered with a keyword columnar transposition using the keyword URGENT.. ( points) Decipher FONIIOSJRJ which was enciphered using the Vigenère method with keyword NUMBER.. ( points) Decipher 00101101, which was enciphered using the binary Vigenère method with the key stream generated by the FSR b b + b 1 mod 2 with initial bit values b b b b 2 b 1 = 10001.. (9 points ) (a) Find the greatest common divisor of 91 and 2. (b) The number 109 is a product of two distinct primes. At most how many trial divisions by primes will be required to find these primes (see the prime table)? (c) Use the corollary to Fermat s little theorem to help to compute 1 mod 9.. (10 points) Suppose that Alicia is implementing RSA with primes p =, q = 1, and public exponent e = 1.

(a) Explain what she does to set up for receiving encrypted messages and calculate all of the numbers that she will use with these choices of p, q, and e. (b) If Roberto wants to send Alicia the message x = 2encrypted using her public key, determine the ciphertext he produces. (c) Suppose Alicia receives the encrypted message y =. Write down the expression she will need to evaluate in order to decrypt. (Do not actually evaluate this expression.) 9. (9 points) Explain briefly but completely what is involved in a cryptanalysis of the Vigenere cipher. Mention the various techniques we have used. 10. (9 points) Shown here are letter distributions for three different ciphertexts, one from a monoalphabetic substitution, one from a polyalphabetic substitution, and one from a transposition. (i) (ii) (iii) A B C 9 D E F G H I J 1 A B C D E F G H I J 22 12 1 1 10 1 29 1 A B C D E F G H I J 0 1 1 0 1 1 10 1 M N 0 O 1 P Q R S T U V W X M N O P Q R S T U V W X 1 2 21 1 1 1 2 0 0 M N O P Q R S T U V W X 2 0 1 0 1 1 1 1 0 9 0 (a) Indicate which distribution corresponds to which cipher. Explain. (b) For the polyalphabetic one, compute the index of coincidence. (c) Assuming encipherment by the Vigenère method with a keyword, use the Friedman test to estimate the keyword length. 11. (9 points) Alice and Bob are going to use the Diffie-Hellman key agreement protocol. If the public prime modulus is p = and the public base is s =,Alice generates the number a = 10, and Bob generates b = 1. Determine the key on which they agree. x 1 9 11 1 1 19 21 2 2 x 1 (mod 2) 1 9 21 1 19 2 11 1 2

A B C D E F G H I J M N O P Q R S T U V W X A B C D E F G H I J M N O P Q R S T U V W X A B C D E F G H I J M N O P Q R S T U V W X B C D E F G H I J M N O P Q R S T U V W X A C D E F G H I J M N O P Q R S T U V W X A B D E F G H I J M N O P Q R S T U V W X A B C E F G H I J M N O P Q R S T U V W X A B C D F G H I J M N O P Q R S T U V W X A B C D E G H I J M N O P Q R S T U V W X A B C D E F H I J M N O P Q R S T U V W X A B C D E F G I J M N O P Q R S T U V W X A B C D E F G H J M N O P Q R S T U V W X A B C D E F G H I M N O P Q R S T U V W X A B C D E F G H I J M N O P Q R S T U V W X A B C D E F G H I J M N O P Q R S T U V W X A B C D E F G H I J N O P Q R S T U V W X A B C D E F G H I J M O P Q R S T U V W X A B C D E F G H I J M N P Q R S T U V W X A B C D E F G H I J M N O Q R S T U V W X A B C D E F G H I J M N O P R S T U V W X A B C D E F G H I J M N O P Q S T U V W X A B C D E F G H I J M N O P Q R T U V W X A B C D E F G H I J M N O P Q R S U V W X A B C D E F G H I J M N O P Q R S T V W X A B C D E F G H I J M N O P Q R S T U W X A B C D E F G H I J M N O P Q R S T U V X A B C D E F G H I J M N O P Q R S T U V W A B C D E F G H I J M N O P Q R S T U V W X A B C D E F G H I J M N O P Q R S T U V W X

Primes 2 19 19 1 9 1229 12 12 211 2 29 11 21 9 121 11 11 21 21 2 191 1 9 12 1 1 211 2 2 19 91 129 19 11 21 29 2 11 19 9 91 9 129 1 1 21 2 29 1 199 01 9 12 19 11 211 2 291 1 211 9 09 991 129 1 1 219 2 29 19 22 19 99 12 11 1 220 20 201 2 22 1 2 1009 129 19 19 220 221 20 29 229 101 1291 1 19 221 21 219 1 2 9 1019 129 19 1901 2221 29 2 29 9 1021 101 101 190 22 2 2 1 21 1 101 10 10 191 229 29 2 21 91 10 10 109 191 22 21 21 2 99 1 109 119 11 19 221 2 2 2 0 9 109 121 119 199 22 29 21 9 29 09 101 12 121 191 229 291 29 1 21 21 101 11 12 19 22 29 2 2 2 9 10 1 1 199 221 209 29 1 21 1 09 109 1 1 19 22 21 290 2 11 10 11 1 199 229 221 2909 9 29 21 1091 199 1 199 229 2 291 0 2 109 109 19 1999 209 2 292 9 11 9 2 109 12 19 200 211 2 299 9 1 1 29 110 12 19 2011 2 29 29 101 1 9 1109 129 199 201 29 2 29 10 1 111 1 109 202 21 21 29 10 9 112 19 121 2029 2 2 299 109 99 9 1129 1 12 209 21 2 291 11 9 01 111 11 1 20 2 2 2999 12 0 11 1 11 20 21 29 001 11 9 1 1 11 19 1 209 2 29 011 1 1 111 11 1 201 21 299 019 19 19 111 11 19 20 2 20 02 19 9 1 90 11 1 1 20 29 211 0