• Keine Ergebnisse gefunden

Cryptography, Final Written Exam (Klausur)

N/A
N/A
Protected

Academic year: 2022

Aktie "Cryptography, Final Written Exam (Klausur)"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

MATHEMATISCHES INSTITUT DER UNIVERSIT ¨AT M ¨UNCHEN

Prof. Otto Forster

SS 2007 July 13, 2007

Cryptography, Final Written Exam (Klausur)

Problem 1

a) Calculate the Jacobi symbol

17

107

.

b) Prove that 17 is a primitive root modulo 107.

Problem 2

Suppose (N, e) = (143,17) is the public key of a mini RSA system. Calculate the decryption exponent d.

Problem 3

To encrypt messages x1, x2 ∈ Z2n2 , Bob uses independent One-Time-Pads p1, p2 ∈Z2n2

and sendsy1 :=x1⊕p1 to Alice andy2 :=x2⊕p2 to Ann. To encrypt another message x3 = (x03, x003)∈Zn2 ×Zn2 =Z2n2

for Amy, he does not use a new independent One-Time-Pad, but uses p3 := p1 ⊕p2 instead. He sends y3 :=x3 ⊕p3 to Amy.

Suppose that the first half x03 of x3 coincides with the first half of x1 and the second half x003 of x3 coincides with the second half of x2.

Which parts of the messages x1, x2 can Eve reconstruct from y1, y2, y3 ? Problem 4

a) Prove that the polynomial f(X) = X5+X2 + 1∈F2[X] is irreducible.

b) What is the period length of the LFSR sequence defined by bk+5:=bk+2+bk for k≥0

with initial vector (b0, . . . , b4) := (0,0,0,0,1)∈ F25 ? What about other initial vectors v ∈F25r{~0} ?

Problem 5

The ElGamal Public-Key Cryptosystem in (Z/p) is defined as follows:

Letp be a prime such that the DL problem in (Z/p) is intractible. The public key of Alice is (p, g, h), whereg is a primitive root modulo pand h=gν modp with a secret exponent ν∈Z/(p−1), only known to Alice.

If Bob wants to send a message x ∈ (Z/p) to Alice, he encrypts it in the following way: He chooses a secret random number α∈Z/(p−1) and calculates

y1 :=gα modp, y2 :=xhα mod p.

The ciphertext is then y= (y1, y2).

How can Alice decrypt the ciphertext?

Referenzen

ÄHNLICHE DOKUMENTE

[r]

What happens if DES uses the keys K i 0 instead of the standard keys K i and what is the relation between the plain- and ciphertext of the standard and this

One of the talks at the conference aroused Knud Knudson’s interest, an election protocol for yes/no votes where each voter can give a positive or negative vote or he can abstain..

I Please note that you need to register for the exam until Friday, November 22, 2013 via CampusOffice... Presentation of the

As a result of a misapprehension, the vendor sent Knud Knudson a smartphone that can save only one point at the same time.. So Knud Knudson must use the server to do

I want to present the exercises marked in the following table in the tutorial. Each mark gives two points if you are present in the tutorial and your solution is good (at least

(10) ElGamal cryptosystem and parameter generation: definition, correctness (encryption and decryption are inverse operations).. Theorem: ElGamal keys versus DLP

(10) ElGamal cryptosystem and parameter generation: definition, correctness (encryption and decryption are inverse operations).. Theorem: ElGamal keys versus DLP