Cryptographic
Download 22.77 Kb.
|
Assignment1Crypto808
Question1: (2 marks) Evaluate in GF (28) with m(x) = x8 + x4 + x3 + x + 1: {02} · ({01} + {03}) · {04} ({88} × {04} + {E9}) · {03} Question2: (2 marks) A left n-bit circular shift can be used to permute bit strings in cryptographic applications. For example the bit string 100 can be circularly shifted: 1-bit left by computing: 100 ×(010) mod (1001) 2-bits left by computing: 100 ×(100) mod (1001) Represent the following left n-bit circular shifts as a binary computa- tion and evaluate the computation. left 3-bit circular shift on 11001. left 5-bit circular shift on C7. Question3: (2 marks) The Diffie-Hellman Key Exchange Protocol involves estab- lishing a secret key s = gab mod p where p is prime and g is a primitive root of p. How many primitive roots (different values of g) are there if: p = 23 p is any prime. Explain each of your answers. Question4: (4 marks) Let p be a prime and a ∈ Z+ such that a < p. Show that C(p, r) mod p = 0 for 1 ≤ r ≤ (p − 1), where p! C(p, r) = . (p − r)!r! given by: (x + a)n n = r=0 C(n, r)xra n−r. Use the results from a) and b) to prove that ap ≡ a mod p using mathematical induction. Show the BASIS STEP (show that for a = 1...) Show the INDUCTIVE HYPOTHESIS (assume that when a = k...) Show the INDUCTIVE STEP. Use the result from c) to prove Fermat’s Little Theorem: ap−1 ≡ 1 mod p Download 22.77 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2025
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling