Download QuestionFile3Cryptography

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Inverse problem wikipedia , lookup

Leonhard Euler wikipedia , lookup

One-time pad wikipedia , lookup

Sieve of Eratosthenes wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Block cipher mode of operation wikipedia , lookup

Diffie–Hellman key exchange wikipedia , lookup

History of cryptography wikipedia , lookup

Cryptanalysis wikipedia , lookup

Cryptography wikipedia , lookup

Transcript
1
CS 413, Question File 3, Cryptography
Chapter 12 topics: Prime numbers, Euler's totient, RSA encryption
1. Define Euler’s totient function in words:
Φ(n) means:
2. If n is prime, give the value for Euler’s function:
Φ(n) =
3. Assuming n = pq where p and q are prime, give the value of Euler’s function:
Φ(n) =
4. If a and n are relatively prime, what does Euler’s theorem tell you about this
expression?
aΦ(n) ≡n
5. Based on Euler’s theorem, for a and n relatively prime, how does this expression
evaluate?
aΦ(n)+1 ≡n
6. RSA encryption involves, among other things, the plaintext M, ciphertext C, and
parameters p, q, e, d, and n. Write the formula for encrypting M:
C=
7. RSA encryption involves, among other things, the plaintext M, ciphertext C, and
parameters p, q, e, d, and n. Write the formula for finding M after encryption into C:
M=
2
8. What is the defining mathematical characteristic of the parameter n in RSA
encryption?
9. Given p and q, and thus the product (p – 1)(q – 1), how should the parameter d be
chosen in RSA encryption?
10. What values or parameters are needed to encrypt in RSA, in other words, what is the
publicly distributed key?
11. What values or parameters are nominally identified as the private key in RSA? What
other parameters have to be kept secret?
12. By the way parameters are chosen in the RSA scheme, how does this evaluate?
ed ≡ (p-1)(q-1)
13. Let d and e have the characteristics defined in RSA encryption. Write an equation
(not a modular equivalence) for the value that the product e*d can take on using Φ(n), a
constant k, and any other items that might be needed in the expression.
14. Suppose some plaintext message M has been converted to a numeric form with a
decimal value less than n. If M and n are relatively prime, how do you expect this to
evaluate?
MΦ(n)+1 ≡n
3
15. Under RSA encryption let p = 3, q = 11, and d = 13. Give the value for e.
16. Suppose the English alphabet is matched as usual with values 0-25. Using the
parameters of the previous problem, show the expressions for decimal integers you would
get if you were encrypting the following letters one at a time.
C=
A=
B=
17. Suppose that p = 5, q = 7, and d = 11. Assume the English alphabet is matched with
the decimal digits 0-25 as usual. A sequence of decimal digits which are the result of
RSA encryption is shown. Give the message that they decrypt to. In other words, find
the plaintext.
The sequence of decimal digits: 1, 0, 2, 2
18. Name three mathematical problems that are underlying components of RSA. Make
sure your answer includes the fundamental problem which renders RSA secure, and
identify it as such.
19. Suppose that you had computed in advance all prime numbers up through those with
a length of 200 decimal digits. Assume that you have sufficient secondary storage for
them and that you can discount paging costs because you can prefetch the primes in order
as needed. Then for some n <= 400 decimal digits in length, what would a simple brute
force attack on an RSA encryption scheme consist of?
4
Possible Answers:
1. The number of integers i, 0 < i < n, such that i is relatively prime to n (gcd(i, n) = 1).
2. n – 1
3. (p – 1)(q – 1)
4. 1
5. a
6. Me mod n
7. Cd mod n
8. It is the product of just two primes, p and q.
9. It is relatively prime to (p – 1)(q – 1).
10. e and n.
11. Nominally: d and n. Others: p and q.
12. 1
13. ed = kΦ(n) + 1
14. M
15. 17
16. 29, 0, 1
17. BASS
18. Finding primes, finding inverses in modular fields, and factoring. Factoring is the
killer.
19. Divide n by each of the primes to see if it goes in evenly. If it does, and this is RSA
encryption, then the quotient (the other factor) had better also be in the list of primes.