Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

Similar documents
Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Classical Cryptography

Security of Networks (12) Exercises

CSCI3381-Cryptography

Introduction to Cryptology. Lecture 2

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CPSC 467b: Cryptography and Computer Security

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Polyalphabetic Ciphers

Lecture Notes. Advanced Discrete Structures COT S

Solutions to the Midterm Test (March 5, 2011)

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1

Solution to Midterm Examination

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

The Hill Cipher A Linear Algebra Perspective

Product Systems, Substitution-Permutation Networks, and Linear and Differential Analysis

5. Classical Cryptographic Techniques from modular arithmetic perspective

Jay Daigle Occidental College Math 401: Cryptology

Exercise Sheet Cryptography 1, 2011

Chapter 2 Classical Cryptosystems

What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL

Cryptography. P. Danziger. Transmit...Bob...

ECE 646 Lecture 5. Motivation: Mathematical Background: Modular Arithmetic. Public-key ciphers. RSA keys. RSA as a trap-door one-way function

Real scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm. David Morgan

Lecture 12: Block ciphers

Number theory (Chapter 4)

Lecture Notes. Advanced Discrete Structures COT S

NHMZK LWOGM PLMXG OBMLE LLOXA RURRJ MIZKL OGYHM KL

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and )

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic

Classical Cryptography

Data and information security: 2. Classical cryptography

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

Math 1350 (FALL 2008) Prelim 1 (10/6/2008) 1. Solution. For the Atbash cipher for the Roman alphabet we have

10 Modular Arithmetic and Cryptography

26 HIDDEN MARKOV MODELS

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc.

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30

Akelarre. Akelarre 1

MATH 158 FINAL EXAM 20 DECEMBER 2016

Public Key Cryptography

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

RSA RSA public key cryptosystem

Public-Key Cryptosystems CHAPTER 4

Introduction to Cryptography CS 355 Lecture 3

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

Math 430 Midterm II Review Packet Spring 2018 SOLUTIONS TO PRACTICE PROBLEMS

Cook-Levin Theorem. SAT is NP-complete

Question: Total Points: Score:

Week 7 An Application to Cryptography

Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2

2.4 The Autokey cipher and cribs

MATH3302 Cryptography Problem Set 2

Classic Cryptography Tutorial. c Eli Biham - May 3, Classic Cryptography Tutorial (3)

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Attempt QUESTIONS 1 and 2, and THREE other questions. penalised if you attempt additional questions.

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 5

MODULAR ARITHMETIC KEITH CONRAD

Public Key Encryption

Notes 4: Stream ciphers, continued. Recall from the last part the definition of a stream cipher:

9 Knapsack Cryptography

Efficient Cryptanalysis of Homophonic Substitution Ciphers

Practice Assignment 2 Discussion 24/02/ /02/2018

A Large Block Cipher using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix

Math 223, Spring 2009 Final Exam Solutions

Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians!

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Elliptic Curve Computations (1) View the graph and an elliptic curve Graph the elliptic curve y 2 = x 3 x over the real number field R.

CMSC 389T MIDTERM SOLUTION

Public-key Cryptography and elliptic curves

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.

CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT

Lecture 22: RSA Encryption. RSA Encryption

MODULAR ARITHMETIC. Suppose I told you it was 10:00 a.m. What time is it 6 hours from now?

The RSA cryptosystem and primality tests

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.

Math.3336: Discrete Mathematics. Mathematical Induction

Implementation Tutorial on RSA

Weaknesses in Hadamard Based Symmetric Key Encryption Schemes

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

Clock Arithmetic and Euclid s Algorithm

Joseph Fadyn Kennesaw State University 1100 South Marietta Parkway Marietta, Georgia

Linear Ciphers. Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D Mainz

Homework 4 for Modular Arithmetic: The RSA Cipher

Introduction to Modern Cryptography. Benny Chor

COMP4109 : Applied Cryptography

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

CHAPTER 4 REDUCTION OF VARIABLE LENGTH KEY SEARCH TIME OF VIGENERE CIPHER USING FIREFLY ALGORITHM

Modern symmetric encryption

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM

then the hard copy will not be correct whenever your instructor modifies the assignments.

Classical Cryptography

Cryptography. pieces from work by Gordon Royle

A Block Cipher using an Iterative Method involving a Permutation

Transcription:

ò{çd@àt ø 2005.0.3. Suppose the plaintext alphabets include a z, A Z, 0 9, and the space character, therefore, we work on 63 instead of 26 for an affine cipher. How many keys are possible? What if we add ;,.,,, and? characters to our plaintext alphabet set, i.e. we work on 67 instead? First, calculate the number of integers which are relative prime with 63 63 3 2 7 63 7 3 36 36 63 2268 67 67 66 67 66 4422 2. The ciphertext UJVDDP was encrypted by a Hill cipher with matrix Find the corresponding plaintext. 4 7 Step : find the inverse matrix modulo 26

4 7 0 0 4+3 4 3 7+5 4 3 0 0+ 4 3 mod26 4+3 22 9 7+5 22 9 0 0+ 22 9 +0 mod26 0 9 0 6 mod26 3+0 5+9 5 9 0 9 +6 5 9 0+ 5 9 6 mod26 3 0 0 9 2 6 mod26 3 3 0 0 9 9 2 3 3 6 9 9 mod26 0 0 7 2 mod26 Step 2: decrypt block by block UJV DDP 20, 9, 2, 3, 3, 5 7 2 20, 9 0, 5mod26 2

2, 3 7 2 5, 8mod26 3, 5 7 2 3, 4mod26 0, 5, 5, 8, 3, 4 AFFINE 3. Trappe 2nd Ed. Chap3.8 Let a, b, c, d, e, f be integers mod 26. Consider the following combination of the Hill and affine ciphers: Represent lock of plaintext as a pair x, y mod 26. The corresponding ciphertext u, v is x, y +e, f u, vmod26 Describe how to carry out a chosen plaintext attack on this system with the goal of finding the key a, b, c, d, e, f. You should state explicitly what plaintexts you choose and how to recover the key. First, we can choose plaintext x, y 0, 0 in order to determine e, f u, v 0, 0 +e, f e, fmod26 Second, we can choose plaintext x, y 0, in order to determine c, d u, v 0, +e, f c + e, d + fmod26 Last, we can choose plaintext x, y, 0 inorder to calculate a, b, 0 +e, f a + c, b + fmod26 3

4. Consider the sequence starting as k,k 2 0, k 3 and define by the length-three recurrence k n+3 k n + k n+ + k n+2. This sequence can also be given by a length-two recurrence. Determine this length-two recurrence by setting up and solving the appropriate matrix equations. Briefly explain the reason why it can be defined by a length-two recurrence equation. Is there a condition such that every sequence satisfying this condition has a unique recurrence describing it? From the recurrence equation and the given initial values, the sequence is 0000... From the proposition at textbook page 48, assume the length of recurrence is three, we can form the Matrix M 3 M 3 x x 2 x 3 x 2 x 3 x 4 x 3 x 4 x 5 0 0 0 0 and find out that M 3 0 we can then try length-two recurrence: x x M 2 2 x 2 x 3 0 0 and find out that M 2 0 therefore, we can solve for the unique length 2 recurrence relation from the following 0 c0 0 M 2 0 c, i.e. c 0 0,c x n+2 x n 4

In general, each sequence has a unique minal length recurrence description, but there can be multiple recurrence solutions for longer length recurrence. Eg. the solutions to 0 0 0 0 0 0 0 0 c 0 c c 2 c 3 include, 0,, and 0, 0, 0, and others 5. The operator of a Vigenere encryption machine is bored and encrypts a plaintext consisting of the same letter of the alphabet repeated several hundred times. The key is a six-letter English word. Eve knows that the key is a word but does not yet know its length. 0 0 a What property of the ciphertext will make Eve suspect that the plaintext is one repeated letter and will allow her to guess that key length is six? She will notice that ciphertext is a repeated sequence of the same six-letter string, so she will guess that the plaintext is one repeated letter and that key length is six. For example, if key is design, the letter is a, the ciphertext is eftjnoeftjnoeftjno.... b Once Eve recognizes that the plaintext is one repeated letter, how can she determine the key? Hint: You need the fact that no English word of length six is a shift of another English word. Since there are only 26 possible candidates for the repeated letter, Eve starts from the repeated ciphertext string ex. eftjno, and subtracts the candidate letter off from each ciphertext ex. assume the letter is a, subtracts a from eftjno gives the key design. Because there is no English word of lengh six that is a shift of another English word, out of these 26 possible reversed keys, there is only one key which is a valid English word. 5

c Suppose Eve doesn t notice the property shown in part a, and therefore uses the method of displacing then counting matches for finding the length of the key. What will the number of matches be for the various displacements? In other words, why will the length of the key become very obvious by this method? Write the ciphertext on a long strip of paper, and again on another long strip. Put one strip above the other, but displaced by a certain number of spaces the potential key length. If we do this for different displacements, we shall find out the maximal number of coincidences when displacement is the key length. Assume that there is no repeated letter in the key, the number of coincidences at other displacement is zero. 6