CSE5473 Homework 1 (due Wednesday, February 11) 0. A disadvantage of the general monoalphabetic cipher is that both sender and receiver must commit the permuted cipher sequence to memory.A common technique for avoiding this is to use a keyword from which the cipher sequence can be generated. For example, using the keyword CIPHER, write out the keyword followed by unused letters in normal order and match this against the plaintext letters: plain: a b c d e f g h i j k l m n o p q r s t u v w x y z cipher: C I P H E R A B D F G J K L M N O Q S T U V W X Y Z If it is felt that this process does not produce sufficient mixing, write the remaining letters on successive lines and then generate the sequence by reading down the columns: C A K S Y I B L T Z P D M U H F N V E G O W R J Q X This yields the sequence: C A K S Y I B L T Z P D M U H F N V E G O W R J Q X Such a system is used in the following example. The ciphertext is: UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ The plaintext is: it was disclosed yesterday that several informal but direct contacts have been made with political representatives of the viet cong in moscow Determine the keyword. 1 1. Alternating ones + zeros (0101010101010101...01) is one of DES weak keys. Give a detailed proof that this DES weak key is its own inverse. (Hint: DES encryption and decryption are the same once the per-round keys are generated.) 2. To speed up RSA, we can require that e=3 for all users. This creates the possibility of a cube root attack. Explain this attack and how to prevent it. For (N,e)=(33,3) and d=7, verify that the cube root attack works when M=3 but not when M=4. 3. Consider the cryptographically secure pseudo random generator with a pseudo random function f in figure 1 and then answer the following questions. Figure 1: Cryptographiically secure PRGs (1) Is the sequence of keys K0, K1, K2... random? (2) Can this generator be used for providing key sequence to a stream cipher? If so, what property of it implys that it can be used? 4. Answer the following questions about a family of 6 people, assuming that birthdays are uniformly distributed through the days of a week, month and a year. Also assume that the year is exactly 365 days and each month is exactly 30 days. a. What is the probability that at least two of the family members have the same birthday? and what is the probability that none of them have the same birthday? b. What is the probability that at least two of the family members are born 2 in the same month? and that none of them were born in the same month? c. What is the probability that at least one of them is born on the first day of a month? 5. Let π be a permutation of the integers 0, 1, 2, ... (2n - 1) such that π(m) gives the permuted value of m, 0≤m<2n . Put another way, π maps the set of n-bit integers into itself and no two integers map into the same integer. DES is such a permutation for 64-bit integers. We say that π has a fixed point at m if π(m) = m. That is, if π is an encryption mapping, then a fixed point corresponds to a message that encrypts to itself. We are interested in the probability that π has no fixed points. Show the somewhat unexpected result that over 60% of mappings will have at least one fixed point. General Notes. In addition to the readings of Lecture 1, read also: 11.111.3 3
© Copyright 2025