• Keine Ergebnisse gefunden

Martin Finn-Sell

N/A
N/A
Protected

Academic year: 2022

Aktie "Martin Finn-Sell"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Topics in Algebra: Cryptography - Blatt 4

http://www.mat.univie.ac.at/~gagt/crypto2019

Goulnara Arzhantseva

goulnara.arzhantseva@univie.ac.at

Martin Finn-Sell

martin.finn-sell@univie.ac.at

1 Test questions from the lecture to refresh:

Question 1. i) Why does ElGamal producetwocomponents of ciphertext?

ii) Why are the exponents used for decryption smaller for ElGamal compared to RSA?

iii) Why is ECC more popular than the original ElGamal?

Question 2. Which of the following statements is true:

i) Breaking ElGamal is equivalent to solving “Asymmetry of ElGamal”;

ii) ElGamal is less efficient for encryption than RSA;

iii) ElGamal is more efficient for decryption than RSA;

iv) There is no message expansion in the RSA-OAEP cryptosystem.

Question 3. Prove the Cayley–Bacharach theorem.

Question 4. a) What other uses of cryptographic proofs-of-work do you know?

b) What are (dis)advantages of deploying distributed ledgers?

Question 5. What is the length (=number of intermediate hash values) of a verification path in the Merkle tree havingntransations? What is it for ak-ary tree withnleaves?

Question 6. Why in your opinion is the difficulty of the proof-of-work in bitcoin set to 10 minutes? What would go wrong if it was changed to 60 minutes or 10 seconds?

1

(2)

2 Exercises

Question 7. State and illustrate both the pigeonhole principle and the probabilistic pigeonhole principle. Explain the applications of both.

Question 8. Let h be an arbitrary hash function with 256-bit output. Show that choosing 2130+1inputs uniformly at random gives a99.966% chance to have at least two inputs that collide.

Question 9. How secure is a Merkle tree? Can we forge messages, and if so what kind of forgeries can we construct?

2

Referenzen

ÄHNLICHE DOKUMENTE

Perspectives on integrating PS enterprises in training delivery under ATVET (Agricultural Technical and Vocational Education and Training) in Rwanda and

Comprehensive Border Security and Management – The Dialogue of the College Since 2009, the College has conducted over sixty specialized training courses and

What is the length (=number of intermediate hash values) of a verification path in the Merkle tree having n transations.. What is it for a k-ary tree with

What is the length (=number of intermediate hash values) of a verification path in the Merkle tree having n transations? What is it for a k-ary tree with n leaves?. Question 18. Why

The preceding suggests the fol- lowing answer to the question what goal incremental confirmation is sup- posed to further: Science aims at informative truth, and one should stick

Nelsen and Daniels‟s (2007) definition of quality is invalid according to Routio‟s (2009) criteria as the two parts of this definition ignores the requirements of the

Ensuite, trois Points d’Échanges Internet (PEI) furent installés au Royaume-Uni, et d’autres pays européens firent de même. Avec l’arrivée de la concurrence dans

Rahel Brunschwiler