University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

Similar documents
Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Math 223, Spring 2009 Final Exam Solutions

CRYPTOGRAPHY AND NUMBER THEORY

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

MATH 158 FINAL EXAM 20 DECEMBER 2016

Question: Total Points: Score:

Public Key Cryptography

Cryptography. P. Danziger. Transmit...Bob...

Public-Key Cryptosystems CHAPTER 4

RSA RSA public key cryptosystem

Solutions to the Midterm Test (March 5, 2011)

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

Solution to Midterm Examination

Name: Mathematics 1C03

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

Week 7 An Application to Cryptography

Practice Assignment 2 Discussion 24/02/ /02/2018

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

CPSC 467b: Cryptography and Computer Security

An Introduction to Cryptography

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Introduction to Modern Cryptography. Benny Chor

Network Security Technology Spring, 2018 Tutorial 3, Week 4 (March 23) Due Date: March 30

Discrete Mathematics GCD, LCM, RSA Algorithm

Ma/CS 6a Class 1. Course Details

Chapter 8 Public-key Cryptography and Digital Signatures

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Exam Security January 19, :30 11:30

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians!

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Implementation Tutorial on RSA

Homework 4 for Modular Arithmetic: The RSA Cipher

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Encryption: The RSA Public Key Cipher

Classical Cryptography

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

ECS 189A Final Cryptography Spring 2011

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.

Attempt QUESTIONS 1 and 2, and THREE other questions. penalised if you attempt additional questions.

One can use elliptic curves to factor integers, although probably not RSA moduli.

Cryptography. pieces from work by Gordon Royle

} has dimension = k rank A > 0 over F. For any vector b!

Lecture 1: Introduction to Public key cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

OWO Lecture: Modular Arithmetic with Algorithmic Applications

Elliptic Curves. Giulia Mauri. Politecnico di Milano website:

Homework Problems, Math 134, Spring 2007 (Robert Boltje)

Practice Exam Winter 2018, CS 485/585 Crypto March 14, 2018

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30

Midterm 1. Total. CS70 Discrete Mathematics and Probability Theory, Spring :00-9:00pm, 1 March. Instructions:

CPSC 467: Cryptography and Computer Security

CIS 551 / TCOM 401 Computer and Network Security

Math.3336: Discrete Mathematics. Mathematical Induction

CS2800 Questions selected for fall 2017

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

CPSC 467b: Cryptography and Computer Security

Lecture Notes, Week 6

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost?

Number Theory Math 420 Silverman Exam #1 February 27, 2018

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Midterm 2. Your Exam Room: Name of Person Sitting on Your Left: Name of Person Sitting on Your Right: Name of Person Sitting in Front of You:

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Cook-Levin Theorem. SAT is NP-complete

Cryptography and Security Final Exam

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B)

CPSC 467b: Cryptography and Computer Security

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

Mathematical Foundations of Public-Key Cryptography

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.

Discrete mathematics I - Number theory

10 Modular Arithmetic and Cryptography

ECE 646 Lecture 5. Motivation: Mathematical Background: Modular Arithmetic. Public-key ciphers. RSA keys. RSA as a trap-door one-way function

ECE596C: Handout #11

Discrete Mathematics for CS Fall 2003 Wagner MT2 Soln

Cryptology with DERIVE in the classroom

Introduction to Cryptography

Elliptic Curve Cryptography

Discrete Mathematics and Probability Theory Spring 2015 Vazirani Midterm #2 Solution

Number Theory & Modern Cryptography

The RSA cryptosystem and primality tests

My brief introduction to cryptography

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Friday 25 January 2019

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1

Number theory (Chapter 4)

1/ 17 2/20 3/19 4/12 5/14 6/13 7/10 Total /105. Please do not write in the spaces above.

ICS141: Discrete Mathematics for Computer Science I

Ma/CS 6a Class 2: Congruences

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015

Practice Final Exam Winter 2017, CS 485/585 Crypto March 14, 2017

Transcription:

Make sure that this examination has 10 numbered pages University of Regina Department of Mathematics & Statistics Final Examination 200910 (April 21, 2009) Mathematics 124 The Art and Science of Secret Writing Name: Student Number: Instructor: Michael Kozdron Read all of the following information before starting the exam. You have 3 hours to complete this exam. Please read all instructions carefully, and check your answers. Show all work neatly and in order, and clearly indicate your final answers. Answers must be justified whenever possible in order to earn full credit. Unless otherwise specified, no credit will be given for unsupported answers, even if your final answer is correct. Some problems require written explanations in context. Only complete solutions written in the context specified by the problem will be awarded full points, and points will be deducted for incoherent, incorrect, and/or irrelevant statements. You may use standard notation; however, any new notations or abbreviations that you introduce must be clearly defined. Calculators are permitted; however, you must still show all your work. Other than these exceptions, no other aids are allowed. Note that blank space is not an indication of a question s difficulty. The order of the test questions is essentially random; they are not intentionally written easiest-to-hardest. This test has 10 numbered pages with 11 questions totalling 150 points. The number of points per question is indicated. For questions with multiple parts, all parts are equally weighted unless otherwise indicated. DO NOT WRITE BELOW THIS LINE Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 TOTAL

1 Name: 1. (8 points) The following ciphertext was produced from plaintext by a columnar transposition. Determine the plaintext. DTGIH OLEOI MDGOF ETONH RCETE RUION SFE

2 Name: Recall that the numerical equivalents of the letters are as follows: A B C D E F G H I J K L M 0 1 2 3 4 5 6 7 8 9 10 11 12 N O P Q R S T U V W X Y Z 13 14 15 16 17 18 19 20 21 22 23 24 25 The following formulas may be helpful for this problem: [ ] [ ] a b A =, det(a) = ad bc, A 1 = det(a) 1 d b. c d c a 2. (12 points) The ciphertext FCUWPZ is the result of a Hill encipherment using the key matrix [ ] 11 18 A =. 12 17 Determine the plaintext.

3 Name: 3. (8 points) Briefly describe how the German Enigma machine used during World War II worked. Be sure to mention all of its primary cryptographic components. 4. (12 points) Decide whether each of the following statements is either true or false. Circle your choice. No explanation is required. T F (a) If the greatest common divisor of integers a and b is 1, then either a or b (or both) must be prime. T F (b) In any sample of ordinary English text, the letter E will be the most frequent. T F (c) A scytale is a device that implements a type of monoalphabetic substitution. T F (d) If an efficient method for factoring very large numbers is found, then RSA would no longer be a secure means of encryption. T F (e) In a substitution cipher, the letters in the plaintext message are rearranged to form the ciphertext. T F (f) Public key cryptosystems tend to run more slowly on computers than secret-key systems.

4 Name: 5. (14 points) Recall that the ASCII equivalents (in decimal) of the letters are as follows: A B C D E F G H I J K L M 65 66 67 68 69 70 71 72 73 74 75 76 77 N O P Q R S T U V W X Y Z 78 79 80 81 82 83 84 85 86 87 88 89 90 (a) (4 pts) Convert the decimal (base ten) number 124 to binary (base 2). (b) (10 pts) Use as a key the 7-bit binary representation of 124 that you found in (a) to decipher 0110000 0110011 0101111 0101000 which was enciphered by a binary Vigenère cipher and interpret the result as four ASCII values. What is the decoded four-letter message? (That is, convert each of the resulting 7-bit strings to a decimal number, and interpret that number as an ASCII equivalent.)

5 Name: 6. (16 points) (a) (10 pts) Use the Euclidean algorithm to find gcd(131071, 2047). (b) (3 pts) Does the inverse of 2047 modulo 131071, exist? If so, find it. If not, explain why it does not exist. (c) (3 pts) From (a) we have one pair of integers s and t such that 131071s + 2047t = gcd(131071, 2047). However, we know that the answer is not unique. Find another pair of integers s and t such that 131071s + 2047t = gcd(131071, 2047).

6 Name: 7. (20 points) For each of the following questions, use Fermat s Little Theorem or Euler s Theorem (or their corollaries) as appropriate. (a) Compute 7 18 MOD 17. (b) Compute 6 84 MOD 13. (c) Compute 6 87 MOD 13. (d) Compute 5 163 MOD 51.

7 Name: Recall that the numerical equivalents of the letters are as follows: A B C D E F G H I J K L M 0 1 2 3 4 5 6 7 8 9 10 11 12 N O P Q R S T U V W X Y Z 13 14 15 16 17 18 19 20 21 22 23 24 25 8. (12 points) Suppose that the plaintext FAME becomes RIOK under an affine cipher Determine a and b. E(x) = (ax + b) MOD 26.

8 Name: Recall that the numerical equivalents of the letters are as follows: A B C D E F G H I J K L M 0 1 2 3 4 5 6 7 8 9 10 11 12 N O P Q R S T U V W X Y Z 13 14 15 16 17 18 19 20 21 22 23 24 25 9. (24 points) In order to prepare to receive encrypted messages with the RSA cryptosystem, Alice has chosen primes p = 31 and q = 1031. She has also chosen e = 2377 as her public key (also called her public exponent). (a) (4 pts) Determine Alice s public modulus m. (b) (12 pts) Determine Alice s private key (or decryption key) d. (c) (8 pts) Suppose that Bob has sent Alice the ciphertext y = 103. twenty-six representation of the plaintext message. Determine the base

9 Name: 10. (12 points) Recall that the Diffie-Hellman key agreement protocol works as follows. A public prime p and a public base s are published (where 0 s p 2). Alice chooses a number a in the range 2 to p 2 and calculates α = s a MOD p. She then sends α to Bob. Bob chooses a number b in the range 2 to p 2 and calculates β = s b MOD p. He then sends β to Alice. The key is then calculated as k = s ab MOD p. Suppose that the public prime is p = 5927 and the public base is s = 31. Suppose further that Alice chooses a = 143 and Bob chooses b = 83. Determine the key k that they agree upon. Hint: Use Fermat s Little Theorem to drastically reduce the exponent before starting the repeated squaring procedure.

10 Name: Recall that the numerical equivalents of the letters are as follows: A B C D E F G H I J K L M 0 1 2 3 4 5 6 7 8 9 10 11 12 N O P Q R S T U V W X Y Z 13 14 15 16 17 18 19 20 21 22 23 24 25 11. (12 points) Decrypt the following English sentence BPMUW ABKMZ BIQVE IGBWA CKKMM LQAIT EIGAB WBZGR CABWV MUWZM BQUM which was encrypted using a shift cipher. Hint: The most frequent ciphertext letters are B and M, which appear eight and seven times, respectively. FOR YOUR WORK: B P M U W A B K M Z B I Q V E I G B W A C K K M M L Q A I T E I G A B W B Z G R C A B W V M U W Z M B Q U M FOR YOUR WORK: B P M U W A B K M Z B I Q V E I G B W A C K K M M L Q A I T E I G A B W B Z G R C A B W V M U W Z M B Q U M