• Keine Ergebnisse gefunden

Algorithmic Cryptography

N/A
N/A
Protected

Academic year: 2022

Aktie "Algorithmic Cryptography"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Walter Unger WS 2013/2014

Sascha Geulen October 24, 2013

Exercise

Algorithmic Cryptography

Sheet 1

Exercise 1.1 (4 points)

Decrypt the following ciphertext and explain your approach.

ABCCD BEAFF GHIJK LGFJC MFJCF IKEGH IJKDK NGEFF KAIOC PIQCH KDKBP KKFAH DIJGP IKKHR GHSIK FHCPI JKAFI AHDLQ HCPIJ RAGHL PAHTJ FKNKH IJEGR LKAFI FGDKF JCCIO PCRIJ KEKOI KQKCO IJKDK AIJFJ KADAL KKEGH KOPCR IJKIP KKIJP CSBJI JKFJC IOGOI QOKKI CSIKD BAPAE EAHMC KIJKB CEDLS B

Hint: The text is in English and the letters appear with the following frequency:

A B C D E F G H I J K L M

15 7 18 10 9 16 11 14 27 20 36 6 2

N O P Q R S T U V W X Y Z

2 8 11 4 5 4 1 0 0 0 0 0 0

Exercise 1.2 (4 points)

Prove: If in DES each bit in the plaintext and in the key is replaced by its complement, then each bit in the ciphertext is also replaced by its complement.

Exercise 1.3 (4 points)

Consider the keys K1, K2, . . . , K16 used in DES in the function f(Ri−1, Ki). Let K10, K20, . . . , K160 be these keys in reverse order, i.e.,K10 =K16, K20 =K15, . . . , K160 =K1. What happens if DES uses the keys Ki0 instead of the standard keys Ki and what is the relation between the plain- and ciphertext of the standard and this modified DES?

Exercise 1.4 (4 points)

Compare encryption and decryption of DES if the key

11100000 11100000 11100000 11100000 11110001 11110001 11110001 11110001 is used.

Deadline:Thursday, October 31, 2013, 10:15 a.m.,

in the lecture or in the letterbox in front of i1.

(2)

Walter Unger WS 2013/2014

Sascha Geulen October 24, 2013

Exercise

Algorithmic Cryptography

Sheet 1

Please fill in your name and your student number and mark the exercises that you can present.

Then staple this page in front of your solution sheet.

Presentation of your exercise solution

I want to present the exercises marked in the following table in the tutorial. Each mark gives two points if you are present in the tutorial and your solution is good (at least two points).

Name Student Number E 1.1 E 1.2 E 1.3 E 1.4

Referenzen

ÄHNLICHE DOKUMENTE

The Growing Block theory is regarded as one of the more commonsensical theories about the nature of time which was introduced by CD Broad (1923). It holds that the past and

You can access the terminal screen at any time by pressing the ON button, holding it, and then pressing the Divide ( ÷ )

At the end of the game, the calculator gives you how may picks you needed to get the target number.. WHILE: Repeat a number of commands while a specific condition

HP Prime Tutorial Series, by Edward Shore and Klaas Kuperus: #1.. The

Uffe Ellemann-Jensen (Denmark) Chairman, Baltic Development Forum; former Foreign Minister Ine Eriksen Søreide (Norway) Member of Parliament; Chair of the Foreign Affairs

• Almost formal three-valued semantics of valid, invalid and inconclusive interleaving traces of events. • Some semantical problems are yet to

I want to present the exercises marked in the following table in the tutorial. Each mark gives two points if you are present in the tutorial and your solution is good (at least

I want to present the exercises marked in the following table in the tutorial. Each mark gives two points if you are present in the tutorial and your solution is good (at least