Math 223, Spring 2009 Final Exam Solutions

Similar documents
Elementary Number Theory MARUCO. Summer, 2018

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

Question: Total Points: Score:

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

MATH 158 FINAL EXAM 20 DECEMBER 2016

Math.3336: Discrete Mathematics. Mathematical Induction

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

Math 430 Midterm II Review Packet Spring 2018 SOLUTIONS TO PRACTICE PROBLEMS

Attempt QUESTIONS 1 and 2, and THREE other questions. penalised if you attempt additional questions.

Solutions to the Midterm Test (March 5, 2011)

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.

Number Theory and Algebra: A Brief Introduction

ECS 189A Final Cryptography Spring 2011

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

1/ 17 2/20 3/19 4/12 5/14 6/13 7/10 Total /105. Please do not write in the spaces above.

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

CPSC 467b: Cryptography and Computer Security

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Name: Mathematics 1C03

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018

Introduction to Number Theory

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Public Key Cryptography

CIS 551 / TCOM 401 Computer and Network Security

Chapter 8 Public-key Cryptography and Digital Signatures

Mathematical Foundations of Public-Key Cryptography

Homework Problems, Math 134, Spring 2007 (Robert Boltje)

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018

Public-Key Cryptosystems CHAPTER 4

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Friday 25 January 2019

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Solution to Midterm Examination

Week 7 An Application to Cryptography

CS1800 Discrete Structures Fall 2016 Profs. Aslam, Gold, Ossowski, Pavlu, & Sprague 27 October, CS1800 Discrete Structures Midterm Version A

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Number Theory Math 420 Silverman Exam #1 February 27, 2018

Carmen s Core Concepts (Math 135)

MATH 310: Homework 7

Network Security Technology Spring, 2018 Tutorial 3, Week 4 (March 23) Due Date: March 30

CPSC 467b: Cryptography and Computer Security

Elementary Number Theory Review. Franz Luef

RSA RSA public key cryptosystem

One can use elliptic curves to factor integers, although probably not RSA moduli.

10 Problem 1. The following assertions may be true or false, depending on the choice of the integers a, b 0. a "

Discrete Mathematics and Probability Theory Summer 2015 Chung-Wei Lin Midterm 1

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B)

Midterm 1. Total. CS70 Discrete Mathematics and Probability Theory, Spring :00-9:00pm, 1 March. Instructions:

Lecture Notes, Week 6

Lecture 1: Introduction to Public key cryptography

SCHOOL OF MATHEMATICS AND STATISTICS

Ma/CS 6a Class 1. Course Details

An Introduction to Probabilistic Encryption

Ma/CS 6a Class 2: Congruences

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Name: There are 8 questions on 13 pages, including this cover.

Introduction to Cybersecurity Cryptography (Part 5)

Introduction to Cybersecurity Cryptography (Part 4)

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015

Practice Assignment 2 Discussion 24/02/ /02/2018

Cryptography IV: Asymmetric Ciphers

Ma/CS 6a Class 2: Congruences

MATH 2200 Final Review

10 Modular Arithmetic and Cryptography

Discrete mathematics I - Number theory

CS2800 Questions selected for fall 2017

Discrete Mathematics and Probability Theory Spring 2015 Vazirani Midterm #2 Solution

10 Public Key Cryptography : RSA

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Introduction to Cybersecurity Cryptography (Part 4)

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

University of New Mexico Department of Computer Science. Midterm Examination. CS 261 Mathematical Foundations of Computer Science Spring, 2010

SOLUTIONS. Math 130 Midterm Spring True-False: Circle T if the statement is always true. Otherwise circle F.

SOLUTIONS Math 345 Homework 6 10/11/2017. Exercise 23. (a) Solve the following congruences: (i) x (mod 12) Answer. We have

Introduction to Cryptography. Lecture 8

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

1 Number Theory Basics

CRYPTOGRAPHY AND NUMBER THEORY

An Introduction to Cryptography

Winter Camp 2009 Number Theory Tips and Tricks

8. Given a rational number r, prove that there exist coprime integers p and q, with q 0, so that r = p q. . For all n N, f n = an b n 2

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

Introduction to Public-Key Cryptosystems:

1. Given the public RSA encryption key (e, n) = (5, 35), find the corresponding decryption key (d, n).

Powers in Modular Arithmetic, and RSA Public Key Cryptography

HOMEWORK 11 MATH 4753

Introduction to Modern Cryptography. Benny Chor

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

MATH 115: ERRATA IN ELEMENTARY NUMBER THEORY, FOURTH EDITION BY KENNETH H. ROSEN

Exam Security January 19, :30 11:30

ECE596C: Handout #11

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online

Lecture Notes. Advanced Discrete Structures COT S

MAT246H1S - Concepts In Abstract Mathematics. Solutions to Term Test 1 - February 1, 2018

Asymmetric Encryption

Solving the general quadratic congruence. y 2 Δ (mod p),

Transcription:

Math 223, Spring 2009 Final Exam Solutions Name: Student ID: Directions: Check that your test has 16 pages, including this one and the blank one on the bottom (which you can use as scratch paper or to continue writing out a solution if you run out room elsewhere). Please answer all questions and show all your work. Write neatly: solutions deemed illegible will not be graded, so no credit will be given. This exam is closed book, closed notes, and no calculators are allowed. You have 2.5 hours. Good luck! 1. (10 points) 2. (10 points) 3. (5 points) 4. (7 points) 5. (10 points) 6. (5 points) 7. (7 points) 8. (10 points) 9. (10 points) 10. (5 points) 11. (10 points) 12. (5 points) 13. (5 points) Total (out of 99): Total after the curve (out of 100): Extra credit (out of 5.3): Final course grade: Final exam letter grade:

Before you start the exam, please indicate the following so that I can give you the appropriate amount of extra credit: 1. Did you give a talk in the student seminar this semester? Answer yes or no here: 2. How many student seminars have you attended this semester? Write the number here: 3. Did you attend the colloquium on matrices given by Alex Diesl from Bowling Green University? Answer yes or no here: 4. Did you attend the colloquium on combinatorics and tilings given by Bridget Tenner from DePaul University? Answer yes or no here: 5. Did you attend the colloquium on origami given by Mike Hill from University of Virginia? Answer yes or no here: 6. Did you attend the colloquium on Poincaré Conjecture given by Pascal Lambrechts from Louvain-la- Neuve University? Answer yes or no here: 7. Did you attend the colloquium on combinatorics and integration given by Mark Kayll from University of Montana? Answer yes or no here: 8. Did you attend the colloquium on complexity given by Joe Mileti from Dartmouth University? Answer yes or no here: 2

1. (2 pts each) Give precise definitions of the following. Please write in full sentences. (a) Order of a number modulo p (b) Sigma function. (c) Symmetric cipher (d) Monoalphabetic cipher (e) One-way function 3

2. (2 pts each) State the following theorems. (a) Linear Equation Theorem (b) Fundamental Theorem of Arithmetic (c) Dirichlet s Theorem on Primes in Arithmetic Progression (d) Primitive Root Theorem (e) Euler Criterion 4

3. (1 pt each) Identify each of the following statements as True, False, or Unknown. No explanation is necessary and no partial credit will be given. (a) A contrapositive of an implication is logically equivalent to that implication. Solution: True. (See your class notes.) (b) The equation x 5 + y 5 = z 5 has infinitely many solutions with x, y, z Z. Solution: False. (Fermat s Last Theorem says this is impossible. We saw a movie about this.) (c) A degree k polynomial has at most k solutions modulo prime p. Solution: True. (Lagrange s Theorem.) (d) A quadratic congruence always has a solution. Solution: False. (Any example we ve had of Legendre symbol being 1 means that a certain quadratic congruence does not have a solution.) (e) RSA encryption is unbreakable. Solution: False. (It is just practically irreversible.) 5

4. (7 pts) Let a, b, c be any integers. Show gcd(a + cb, b) = gcd(a, b). Solution: Let G = gcd(a, b) and g = gcd(a + cb, b). Note that g cb for any c Z since g b. Also g (a + cb) and thus g (a + cb) cb = a. So g divides both a and b and hence g G. On the other hand, since G a and G b, we also have G bc and thus G (a + bc). So G g. From the two inequalities it follows that G = g. 6

5. (5 pts each) Use Fermat s Little Theorem or Euler s Formula to do the following. (a) Find a solution to the congruence x 38 3 (13). Solution: By Fermat s Little Theorem, we have x 12 1 (mod 13). Thus x 38 = (x 12 ) 3 x 2 x 2 (mod 13), so it suffices to solve x 2 3 (mod 13). By inspection, we find that this equation has a solution x = 4 (or x = 9). (b) Find the last digit of 3 1000. Solution: This question is asking to reduce 3 1000 modulo 10. Since φ(10) = 4, by Euler s Formula we have 3 1000 = (3 4 ) 250 1 250 (mod 10) 1 (mod 10), and so the last digit of 3 1000 is 1. 7

6. (5 pts) Prove that there are infinitely many primes. Solution: See class notes, textbook, or Midterm 2. 8

7. (7 pts) Let p be a prime and suppose b is the inverse of a modulo p. Prove that e p (a) = e p (b). Solution: This was a homework problem. 9

8. (5 pts each) (a) Let p be an odd prime. Prove that there are p 1 2 φ(p 1) quadratic nonresidues of p that are not primitive roots of p. Solution: This was a problem on final review. (b) Prove that, if p is a Fermat prime, then every quadratic nonresidue of p is also a primitive root of p. (Recall that a Fermat prime has the form 2 2n + 1 for some n N.) Solution: This was a problem on final review. 10

9. (5 pts each) (a) Let p be an odd prime and let a, b Z be inverses modulo p. Prove that if a is a quadratic residue modulo p, then so is b. Solution: This was a homework problem. (b) Determine whether 13 is a quadratic residue modulo 17. Solution: Since 13 1 (mod 4) (same for 17), we have by Quadratic Reciprocity ( ) 13 = 17 Thus 13 is a quadratic residue modulo 17. ( ) ( ) ( ) 17 4 2 2 = = = 1. 13 13 13 11

10. (5 pts) Encrypt HELLO using the Vigenère cipher with codeword HI. Use A = 0, B = 1,..., Z = 25. Solution: Ciphertext is OM ST V. 12

11. (10 pts) Describe how RSA encryption and decryption works. Make sure to clearly identify the public and private keys and write equations which produce ciphertext C and recover plaintext P. (If you want, you can use Alice and Bob as two parties exchanging RSA-encrypted messages.) Solution: See your class notes. 13

12. (5 pts) Suppose A and B agree to use the prime 5 and its primitive root 2 for Diffie-Hellman key exchange. Suppose A then privately chooses 3 while B chooses 2. What is the key they will share? Solution: The key is 4 (2 3 ) 2 (2 2 ) 3 (mod 5). 14

13. (5 pts) Write a short explanation of why one-time pad is an unbreakable cipher. Solution: This was a homework problem. 15