Cryptographic


Download 22.77 Kb.
Sana22.02.2023
Hajmi22.77 Kb.
#1222541
Bog'liq
Assignment1Crypto808



Question1: (2 marks) Evaluate in GF (28) with m(x) = x8 + x4 + x3 + x + 1:

    1. {02} · ({01} + {03}) · {04}

    2. ({88} × {04} + {E9}) · {03}



Question2: (2 marks) A left n-bit circular shift can be used to permute bit strings in cryptographic applications. For example the bit string 100 can be circularly shifted:

      • 1-bit left by computing: 100 ×(010) mod (1001)

      • 2-bits left by computing: 100 ×(100) mod (1001)

Represent the following left n-bit circular shifts as a binary computa- tion and evaluate the computation.

  1. left 3-bit circular shift on 11001.

  2. left 5-bit circular shift on C7.



Question3: (2 marks) The Diffie-Hellman Key Exchange Protocol involves estab- lishing a secret key s = gab mod p where p is prime and g is a primitive root of p. How many primitive roots (different values of g) are there if:

  1. p = 23

  2. p is any prime.

Explain each of your answers.



Question4: (4 marks) Let p be a prime and a ∈ Z+ such that a < p.

  1. Show that C(p, r) mod p = 0 for 1 ≤ r ≤ (p − 1), where

p!

C(p, r) =
.
(p r)!r!







  1. Show that (k + 1)p kp + 1p mod p using the Binomial Series

given by: (x + a)n
n
=
r=0
C(n, r)xra
nr.




  1. Use the results from a) and b) to prove that ap a mod p using mathematical induction.

    • Show the BASIS STEP (show that for a = 1...)

    • Show the INDUCTIVE HYPOTHESIS (assume that when

a = k...)

    • Show the INDUCTIVE STEP.


  1. Use the result from c) to prove Fermat’s Little Theorem:



ap1 ≡ 1 mod p


Download 22.77 Kb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling