Homework Problems, Math 134, Spring 2007 (Robert Boltje)

Similar documents
Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

} has dimension = k rank A > 0 over F. For any vector b!

Attempt QUESTIONS 1 and 2, and THREE other questions. penalised if you attempt additional questions.

Introduction to Cryptography

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Name: Solutions Final Exam

The security of RSA (part 1) The security of RSA (part 1)

Mathematics for Cryptography

Elementary Number Theory MARUCO. Summer, 2018

1 Structure of Finite Fields

Applied Cryptography and Computer Security CSE 664 Spring 2018

SOLUTIONS Math 345 Homework 6 10/11/2017. Exercise 23. (a) Solve the following congruences: (i) x (mod 12) Answer. We have

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Senior Math Circles Cryptography and Number Theory Week 2

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.

MATH 145 Algebra, Solutions to Assignment 4

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Math.3336: Discrete Mathematics. Mathematical Induction

Mathematical Foundations of Public-Key Cryptography

Mathematics of Cryptography

Basic elements of number theory

Basic elements of number theory

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

THE RSA CRYPTOSYSTEM

AN ALGEBRAIC PROOF OF RSA ENCRYPTION AND DECRYPTION

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

MATH 158 FINAL EXAM 20 DECEMBER 2016

Number Theory and Algebra: A Brief Introduction

Coding Theory ( Mathematical Background I)

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.

Math/Mthe 418/818. Review Questions

Public Key Cryptography

Math 223, Spring 2009 Final Exam Solutions

Number Theory Math 420 Silverman Exam #1 February 27, 2018

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation

Ma/CS 6a Class 3: The RSA Algorithm

MATH 4400 SOLUTIONS TO SOME EXERCISES. 1. Chapter 1

CS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II

Math 430 Midterm II Review Packet Spring 2018 SOLUTIONS TO PRACTICE PROBLEMS

Number Theory and Group Theoryfor Public-Key Cryptography

Week 7 An Application to Cryptography

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Algebraic structures I

CRYPTOGRAPHY AND NUMBER THEORY

MATH 3240Q Introduction to Number Theory Homework 5

Integers and Division

Exercises MAT2200 spring 2014 Ark 5 Rings and fields and factorization of polynomials

Iterated Encryption and Wiener s attack on RSA

CHAPTER I. Rings. Definition A ring R is a set with two binary operations, addition + and

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Discrete Logarithms. Let s begin by recalling the definitions and a theorem. Let m be a given modulus. Then the finite set

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

Number Theory Notes Spring 2011

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

10 Problem 1. The following assertions may be true or false, depending on the choice of the integers a, b 0. a "

Lecture 1: Introduction to Public key cryptography

Congruences and Residue Class Rings

CIS 551 / TCOM 401 Computer and Network Security

Cryptography. pieces from work by Gordon Royle

Fall 2017 September 20, Written Homework 02

ECEN 5022 Cryptography

10 Modular Arithmetic and Cryptography

Ma/CS 6a Class 4: Primality Testing

Homework #2 solutions Due: June 15, 2012

a the relation arb is defined if and only if = 2 k, k

Name: Mathematics 1C03

A. Algebra and Number Theory

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

MATH 361: NUMBER THEORY FOURTH LECTURE

Definition 6.1 (p.277) A positive integer n is prime when n > 1 and the only positive divisors are 1 and n. Alternatively

Math 131 notes. Jason Riedy. 6 October, Linear Diophantine equations : Likely delayed 6

The RSA cryptosystem and primality tests

Discrete Math, Second Problem Set (June 24)

12x + 18y = 50. 2x + v = 12. (x, v) = (6 + k, 2k), k Z.

THE RSA ENCRYPTION SCHEME

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Chapter 8 Public-key Cryptography and Digital Signatures

I216e Discrete Math (for Review)

Math.3336: Discrete Mathematics. Primes and Greatest Common Divisors

ICS141: Discrete Mathematics for Computer Science I

HOMEWORK 11 MATH 4753

Network Security Technology Spring, 2018 Tutorial 3, Week 4 (March 23) Due Date: March 30

CS2800 Questions selected for fall 2017

CPSC 467b: Cryptography and Computer Security

Ma/CS 6a Class 4: Primality Testing

Groups in Cryptography. Çetin Kaya Koç Winter / 13

Number Theory A focused introduction

Number Theory. Modular Arithmetic

MATH 3030, Abstract Algebra FALL 2012 Toby Kenney Midyear Examination Friday 7th December: 7:00-10:00 PM

An Introduction to Cryptography

ax b mod m. has a solution if and only if d b. In this case, there is one solution, call it x 0, to the equation and there are d solutions x m d

MATH3302 Cryptography Problem Set 2

The number of ways to choose r elements (without replacement) from an n-element set is. = r r!(n r)!.

Some Facts from Number Theory

2 More on Congruences

Transcription:

Homework Problems, Math 134, Spring 2007 (Robert Boltje) 1. Write a computer program that uses the Euclidean Algorithm to compute the greatest common divisor d of two natural numbers a and b and also integers u and v such that d = ua + vb. 2. (a) Let (a, b) = (153680, 79269). Compute d := gcd(a, b) and determine u, v Z satisfying d = ua + vb, both going through the Euclidean Algorithm by hand. Check your answer with the program you wrote. (b) Let (a, b) = (2458437443, 903827662). Now compute d and u, v as in (a), using your own program. 3. Let a and b be natural numbers, set d := gcd(a, b), and let u 0 and v 0 be integers such that d = u 0 a + v 0 b. Show that the set of pairs (u, v) Z Z satisfying d = ua + vb is given as {(u 0, v 0 ) + t(r, s) t Z}, where r := b/d and s := a/d. 4. Let S and T be rings and let R := S T. (a) Show that R is again a ring if one defines (s 1, t 1 )+(s 2, t 2 ) := (s 1 +s 2, t 1 +t 2 ) and (s 1, t 1 ) (s 2, t 2 ) := (s 1 s 2, t 1 t 2 ) for s 1, s 2 S and t 1, t 2 T. What is the zero-element and what is the one-element of R? (b) Show that R = S T. 5. Let R and S be rings and let f : R S be a ring homomorphism. (a) Show that f(0) = 0 and that f( r) = f(r) for all r R. (b) Show that if u R, then f(u) S and f(u) 1 = f(u 1 ). 6. Let R be a commutative ring. Show that the function ( ) a b det: M 2 (R) R, ad bc, c d satisfies det(ab) = det(a) det(b) for all A, B M 2 (R). Is this still true if one drops the commutativity assumption on R?

7. Find x {0,..., 17016} such that the three congruences are simultaneously satisfied. x 3 mod 119 x 2 mod 11 x 8 mod 13 8. Let n = n k 10 k + + n 2 100 + n 1 10 + n 0 with n 0,..., n k {0,..., 9} the digits of n as decimal number. Show that (a) n n 0 + n 1 + n 2 + + n k mod 9. (b) 9 n 9 n 0 + n 1 + + n k. (c) n n 0 n 1 + n 2 + mod 11. (d) 11 n 11 n 0 n 1 + n 2 +. 9. With the notation of Exercise 8, find a similar rule for divisibility by 7. 10. Compute 289 3812 mod 121. 11. Determine the units of the ring Z/30Z and find their inverses. 12. Decide if the matrix ( ) 3 + 1001Z 120 + 1001Z A = M 14 + 1001Z 73 + 1001Z 2 (Z/1001Z) is invertible and if yes, determine its inverse. 13. For a = 286, 12, 5690, determine if the following elements (a + (12001Z) are invertible in Z/12001Z, and if yes, compute the inverse. 14. Let n > 2 be an odd natural number. Show that φ(n) is a power of 2 if and only if n is a product of Fermat primes each of which occurring with multiplicity 1. (One can show that a regular n-gon can be constructed with compass and straight edge if and only if ϕ(n) is a power of 2.) 15. Assume the letters A-Z are labeled by 0,..., 25 and the blank is labeled by 26. Encipher the message everything is ok using the affine cryptosystem for R = Z/27Z with the key (a, b) = (8, 13).

16. Assume that the following message is enciphered with the labeling of letters and the blank as in Problem 15 using an affine cryptosystem for R = Z/27Z. Try to find the key (a,b) using frequency analysis. The message is: 15 8 1 17 13 9 17 10 11 1 9 10 22 2 7 17 21 1 24 22 7 12 17 10 1 21 25 24 11 1 2 17 1 17 8 3 22 26 17 3 1 26 19 11 5 1 11 26 22 1 19 8 16 22 21 9 15 11 19 2 7 17 1 23 25 15 7 19 11 19 17 24 1 1 15 1 10 17 24 11 7 17 24 24 1 19 21 15 18 19 8 15 11 19 22 8 1 15 8 3 1 15 1 9 15 11 19 17 8 11 1 9 17 10 11 19 8 15 16 19 11 0 1 1 5 22 26 15 10 3 1 26 1 17 12 17 24. 17. Decipher the message U?DIPPWKCKIKFBWZERRXTV AXN,FG.SAYCHY VTMIMBG.LHTV KCPEAF?.FSGGZ.YOQMZQL.D WKLHYCHIVT,REEKQMJSLEAFXWWVFMKQQUQEW OQHI.BOG.UN.JGNIZQYESRMOQGNWMTVZHF, OKQYZQBLVNQ.MJSLMKQQUQRXKMJEG.ZH WRM.HYNDV,REE,RGBJR.F?NFHMHGHSFMKTZPDKA?EVJEM W?T MDOYU.FSFYCKWSHKNGEG.LH?N FHMHGHSFOQCCESRM?N,RZBE,.HZZQLIHWWCZ.KHIIJOWIHW..HQQUQUNRMJR.F?TWANUEGSE GTSHFXWZGHDOOQGNVFMKWE,MBFE,.H,XOQWK ZBOTRZON.ECJQLWZFXWZQQUQ.GMZCIG.VZKW V.Q.NXVTG.QQUQ.USFMKBOBFEM WYCHIVTJR.FJLVZGNMJSL?Z QIOWCESRMSFSWSEYRWK under the assumption that it is an affine matrix encryption ( ) using the thirty letters 0 A-Z,,,,.,? with key (A, B) where B =. Also assume that you 0 know that the plaintext message ends with the four letters les. 18. Finish Example 5.4 from class by finding the correct matrix A. 19. Assume you intercept the message PSQIUF and you know it has been enciphered using the affine digraph cryptosystem for the ring R = Z/729Z and the labeling as in Problem 15 with the key (a, b) = (320, 155). Decipher the message. 20. Find primes p, q for yourself such that n := pq is in the range between N 3 = 27, 000 and N 4 = 810, 000 (where N = 30). Find a possible e for the RSA cryptosystem and compute the deciphering exponent d. Send your enciphering

key (n, e) via email to boltje@ucsc.edu. We will make our own phone book for the RSA cryptosystem. 21. Assume that with the RSA cryptosystem somebody s phone book entry is (n, e) = (11247661, 268729) and assume you found out that it is very likely that a 7169e a mod n for all a {0,..., n 1}. Find the prime decomposition of n and the deciphering key (n, d) from this information. 22. Show that if f : G H is a group homomorphism then f(1 G ) = 1 H and f(g 1 ) = f(g) 1 for all g G. 23. Show that for every ring R, the set R of invertible elements forms a group under multiplication. 24. A group G is called cyclic, if there exists an element x G such that every element g G can be written in the form g = x k for some k Z. In this case x is called a generator of G. Assume now that G is cyclic, that x is a generator of G and that G has n elements. Show: (a) For all k, l Z one has: x k = x l if and only if k l mod n. (b) For every k Z one has: x k is a generator of G if and only if gcd(k, n) = 1. 25. (a) Find a generator of the group G = (Z/17Z). (b) Is the group (Z/16Z) cyclic? (c) Is the group (Z/27Z) cyclic? 26. Let G and G be groups and let f : G G be a group homomorphism. (a) Show that if H G and H G, then f(h) := {f(h) h H} G and f 1 (H ) := {g G f(g) H } G. (b) Show that ker(f) G and im(f) G. 27. Find all primitive roots modulo 13. 28. We will soon post the list of keys for the RSA cryptosystem on the class web page. Use the 30-letter alphabet from Problem 17 to send messages to other people. Include a copy to Ted to get credit. 29. Compute the greatest common divisor of the polynomials 2x 5 + 3x 4 + x 2 + 4 and x 4 + 2x 3 + x + 3 in the polynomial ring F [x] with F = Z/5Z.

30. Let F = Z/3Z. Compute an inverse of the polynomial x 2 + x + 1 in F [x] modulo the polynomial x 3 + x 2 + x + 2. 31. Determine all irreducible polynomials in (Z/2Z)[x] of degree 2,3, and 4. 32. Is x 4 + 3x 2 2x + 1 irreducible in (Z/5Z)[x]? 33. Let F = Z/3Z. (a) Show that f = x 2 + x + 2 is irreducible in F [x]. (b) Consider the multiplicative group G of units of the field F [x]/(f). What is the order of G? Find an element that generates G. 34. Construct a field F with 25 elements and find a generator of F. How many such generators are there? 35. Assume you use the knapsack cryptosystem and that you have chosen (v 0,..., v 4 ) = (3, 4, 10, 19, 40), m = 100, and a = 19. (a) What do you publish? (b) Assume that another person wants to send the message YESTERDAY to you, using 5 digit base-2 numbers to label the letters A-Z. What does that person send? (c) You get the message (166, 227, 227, 133). What does it mean? 36. Find a generator of the group (Z/625Z). 37. Consider the prime p = 123121 and the number a := 85734. Find out if the congruence x 2 a mod p has a solution. 38. Find the next prime after the prime p = 123121 using the Solovay- Strassen test. 39. Find a Carmichael number different from 561.