• Keine Ergebnisse gefunden

Algorithmic Cryptography

N/A
N/A
Protected

Academic year: 2022

Aktie "Algorithmic Cryptography"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Walter Unger WS 2017/2018

Janosch Fuchs October 19, 2017

Exercise

Algorithmic Cryptography

Sheet 1

• Write the name, group number and enrollment number of each group member on every sheet that you hand in.

• To achieve the permission for the exam you must earn50% of the sum of all points and present one of your solutions at least once.

• You can earn 50% bonus points by presenting your solution. At the beginning of every exercise session, you can mark the exercises that you want to present.

• If a student is not able to present a correct solution although he/she marked the exercise as presentable, he/she will lose all of his/her points on the exercise sheet.

Exercise 1.1 (4 points)

Decrypt the following ciphertext and explain your approach.

ABCCD BEAFF GHIJK LGFJC MFJCF IKEGH IJKDK NGEFF KAIOC PIQCH KDKBP KKFAH DIJGP IKKHR GHSIK FHCPI JKAFI AHDLQ HCPIJ RAGHL PAHTJ FKNKH IJEGR LKAFI FGDKF JCCIO PCRIJ KEKOI KQKCO IJKDK AIJFJ KADAL KKEGH KOPCR IJKIP KKIJP CSBJI JKFJC IOGOI QOKKI CSIKD BAPAE EAHMC KIJKB CEDLS B

Hint: The text is in English and the letters appear with the following frequency:

A B C D E F G H I J K L M

15 7 18 10 9 16 11 14 27 20 36 6 2

N O P Q R S T U V W X Y Z

2 8 11 4 5 4 1 0 0 0 0 0 0

Exercise 1.2 (4 points)

Prove: If in DES each bit in the plaintext and in the key is replaced by its complement, then each bit in the ciphertext is also replaced by its complement.

Exercise 1.3 (4 points)

Consider the keys K1, K2, . . . , K16 used in DES in the function f(Ri−1, Ki). Let K10, K20, . . . , K160 be these keys in reverse order, i.e.,K10 =K16, K20 =K15, . . . , K160 =K1. What happens if DES uses the keys Ki0 instead of the standard keys Ki and what is the relation between the plain- and ciphertext of the standard and this modified DES?

(2)

Exercise 1.4 (4 points) Compare encryption and decryption of DES if the key

11100000 11100000 11100000 11100000 11110001 11110001 11110001 11110001 is used.

Deadline:Thursday, October 26, 2017, 10:15 a.m.,

in the lecture or in the box in front of the i1.

Referenzen

ÄHNLICHE DOKUMENTE

Attempts to generate a new framework or new umbrella term (e.g., NPR, 2015; EdWeek, 2015) while well-intentioned, are not designed to address what we see as the

In fact, pigeons need much con- vincing that exactly the same colour stimulus pre- sented in the frontal and the lateral visual field is equivalent (Mallin & Delius, 1983).

Step 3 : To get the amplitudes, the matrix elements of these operators between meson states remain to be.. 2: Illustration of the treatment of various QCD effects. a) Tower of

Intended for terminal users whose data is primarily textual (as opposed to formatted data entry), the Entry Assist feature provides a number of useability

The analysis improves on earlier accounts in German descriptive linguistics in that it offers a fully compositional account of the semantic and pragmatic contribution of eigentlich in

ةينبلا يراشم ىلع قافنلا اذه ناك اذا صاخلا عاطقلا تارامثتسلا يموكحلا قافنلاا لبق نم زيفحت كانه نا تاساردلا هذه لاا قافنلاا ناك اذا ةمحازم كانه امنيب ،ةيتحتلا

ةينبلا يراشم ىلع قافنلا اذه ناك اذا صاخلا عاطقلا تارامثتسلا يموكحلا قافنلاا لبق نم زيفحت كانه نا تاساردلا هذه لاا قافنلاا ناك اذا ةمحازم كانه امنيب ،ةيتحتلا

ةينبلا يراشم ىلع قافنلا اذه ناك اذا صاخلا عاطقلا تارامثتسلا يموكحلا قافنلاا لبق نم زيفحت كانه نا تاساردلا هذه لاا قافنلاا ناك اذا ةمحازم كانه امنيب ،ةيتحتلا