Cryptographic
Download 22,77 Kb.
|
Assignment1Crypto808
Question1: (2 marks) Evaluate in GF (28) with m(x) = x8 + x4 + x3 + x + 1:
Question2: (2 marks) A left n-bit circular shift can be used to permute bit strings in cryptographic applications. For example the bit string 100 can be circularly shifted:
Represent the following left n-bit circular shifts as a binary computa- tion and evaluate the computation.
Question3: (2 marks) The Diffie-Hellman Key Exchange Protocol involves estab- lishing a secret key s = gab mod p where p is prime and g is a primitive root of p. How many primitive roots (different values of g) are there if:
Explain each of your answers. Question4: (4 marks) Let p be a prime and a ∈ Z+ such that a < p.
p! C(p, r) = . (p − r)!r!
given by: (x + a)n n = r=0 C(n, r)xra n−r.
a = k...)
ap−1 ≡ 1 mod p Download 22,77 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2025
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling