Introduction to Cryptography – Exercise no. 4 [PDF]

Introduction to Cryptography – Exercise no. 4. Submit in Pairs/Single to mailbox 19 by 25/5/11, 1:00 p.m.. 1. Prof. Na

23 downloads 22 Views 148KB Size

Recommend Stories


a classical introduction to cryptography exercise book
The only limits you see are the ones you impose on yourself. Dr. Wayne Dyer

Introduction to Quantum Cryptography
Seek knowledge from cradle to the grave. Prophet Muhammad (Peace be upon him)

Introduction to Cryptography
We must be willing to let go of the life we have planned, so as to have the life that is waiting for

PdF Introduction to Modern Cryptography, Second Edition
Ask yourself: What do I need to change about myself? Next

Introduction to Cryptography (Math 465)
Ask yourself: Do I enjoy my own company? Can I be alone without feeling lonely? Next

Introduction to Cryptography Class Activities
In the end only three things matter: how much you loved, how gently you lived, and how gracefully you

ePUB Introduction to Cryptography with Coding Theory
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Solutions to Exercise Series 4
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

[PDF] Download ACSM s Introduction to Exercise Science Read Books
Ask yourself: How much time do I spend dwelling on the past or worrying about the future? Next

Download [PDF] Introduction to Exercise Science Full Mobi
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

Idea Transcript


University of Haifa

Spring Semester – 3/5/11

Introduction to Cryptography – Exercise no. 4 Submit in Pairs/Single to mailbox 19 by 25/5/11, 1:00 p.m. 1. Prof. Namlleh observed that in the Diffie-Hellman key exchange protocol, each user U publishes YU = g XU mod p, where p is a known large prime number, and g ∈ Zp is a generator of Zp . (a) Show that given p, g, YU = g XU mod p it is possible to reveal the least significant bit of XU . His assistant, Dr. Eiffid, proposed the following algorithm to solve the DLOG problem, given the least significant bit of XU : • Compute the least significant bit of XU . • If the LSB is 1, let YU0 = YU · g −1 , otherwise let YU0 = YU . • Compute the square root of YU0 , and repeat the algorithm on the square root until YU0 = 1. • By collecting the LSBs one can reconstruct X 0 . (b) Show that each YU0 is a quadratic residue modulo p. 0

(c) Show that the LSBs collected by the algorithm, denoted by X 0 , satisfies g X ≡ YU mod p. Conclude that the secret key of U is XU ≡ X 0 mod p − 1. (d) Explain why the above algorithm cannot compute the DLOG XU in spite of the above.  1000 using the methods taught in class, describe your 2. (a) Calculate the Jacobi symbol 78921 calculations. (b) Prove that if n = pe11 · pe22 · · · pe` ` then  `  Y 1 ϕ(n) = n · 1− pi i=1

(c) For a cipher with a key K a message M is called a fixpoint if EK (M ) = M . Prove that in an RSA system with n = pq and a public key (n, e) the number of fixpoints is (gcd(p − 1, e − 1) + 1) · (gcd(q − 1, e − 1) + 1). 3. (a) Find the modular square roots of 7 modulo 31, using the algorithm we saw in class. Describe your calculations. (b) Find the modular square roots of 2 modulo 17, using the algorithm we saw in class. Describe your calculations. (c) Find the modular square roots of 53 modulo 143, using the algorithm we saw in class. Describe your calculations. 1

4. This question discuss RSA in the real world. (a) Alice has an RSA public key of the form (n, e = 3). When Bob wants to send Alice a message, he encrypts it using Alice’s public key (i.e., computes c = m3 mod n). If for some reason Alice fails to receive correctly the message, she informs Bob on the matter, and he retries to send the message again. However, this time, to prevent repeating the same message, Bob encrypts m+1 (i.e., c0 = (m+1)e mod n). Show how Eve can exploit this protocol to obtain m. (Hint: try to obtain x = m2 + m mod n and then compute x + 1 and x + m3 ). (b) An efficient implementation for the decryption of RSA, uses the fact that the recipient knows not only d, but also p and q. The algorithm starts with computing mp = cd mod p and mq = cd mod q, and then combines the results using the Chinese Reminder Theorem. What is the expected speed-up of this approach with comparison to computing cd mod n directly? (c) Consider the case where the recipient decrypted a ciphertext c using the above method, but during decryption mod p, he obtained a wrong value (i.e., m0p 6= cd mod p), and thus constructed a wrong value m0 . Show that an adversary who knows m0 and in addition the correct message m, can obtain the factorization of n = pq. (d) As mentioned in class, choosing e = 3 allows for a fast encryption/signature verification which takes at most only two exponentiations. Show that in this case, d has a relatively large value. Explain why the system is still secure. (e) It was suggested that for servers which need to decrypt/sign many messages, its better to have lower computational overload, and thus, pick a small d. Explain why picking d = 3 is not a good idea.

2

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.