5. The ciphertext is QZNHOBXZD. The decryption function is 21x+9
The possible values for α
There are many such possible answers, for example x=1
The key is AB. The original plaintext is BBBBBBABBB.
One possibility: 1=(−1)⋅101+6⋅17
6
d=13
Decryption is performed by raising the ciphertext to the 13th power mod 31.
x≡22 (mod 59)
No solutions.
If n=ab
gcd(30030, 257)=1
No prime less than or equal to √257≈16.03
The gcd is 257.
4883=257⋅19
The gcd is 1.
The gcd is 1.
The gcd is 1.
Use the Corollary in Section 3.2.
Imitate the proof of the Corollary in Section 3.2.
19. The smallest number is 58 and the next smallest number is 118.
x≡43, 56, 87, 100 (mod 143)
x≡44, 99 (mod 143)
77≡3 (mod 4)
The last digit is 3.
(521225)
b≡0, 2, 4, 6, 8, 10, 12, 16, 18, 20, 22, 24 (mod 26)
No solutions.
There are solutions.
No solutions.
0.
P(M=cat|C=mxp)≠P(M=cat)
3. The conditional probability is 0. Affine ciphers do not have perfect secrecy.
1/2.
m0=HI, m1=BE
Possible.
Possible.
Impossible.
(1091323)
(10191319)
Alice’s method is more secure.
Compatibility with single encryption.
Switch left and right halves and use the same procedure as encryption. Then switch the left and right of the final output.
After two rounds, the ciphertext alone lets you determine M0
Three rounds is very insecure.
3. The ciphertext from the second message can be decrypted to yield the password.
The keys for each round are all 1s, so using them in reverse order doesn’t change anything.
All 0s.
We have W(4)=W(0)⊕T(W(0))=T(W(0))
Since addition in GF(28)
d=27
Imitate the proof that RSA decryption works.
11. Bob computes b1
17. e=1
23. We have (516107⋅187722)2≡(2⋅7)2 (mod n)
25. Combine the first three congruences. Ignore the fourth congruence.
31. There are integers x
1000000 messages.
L2(3)=4
27≡11 (mod 13)
65≡10
x
13. Alice sends 10
Finding square roots mod pq
h(x)≡h(n−x)
Let m1≡mr1r−1 (mod p−1)
1. Use the Birthday attack. Eve will probably factor some moduli.
0101
and 0110
.
Enigma does not encrypt a letter to itself, so DOG
is impossible.
If the first of two long plaintexts is encrypted with Enigma, it is very likely that at least one letter of the second plaintext will match a letter of the ciphertext. More precisely, each individual letter of the second plaintext that doesn’t match the first plaintext has probability around 1/26 of matching, so the probability is 1−(25/26)90≈0.97
We have r≡α1(cx+w)+α2≡Hx+α1w+α2 (mod q)
Since c1≡w+xc (mod q)
Multiply by s
This may be rewritten as
Since r1≡usd+x1
The only place r1
The Spender spends the coin correctly once, using r1, r2
7. Fred only needs to keep the hash of the file on his own computer.
The secret is 13 (mod 17)
Nelson computes a square root of y mod p
Use the x2≡y2
No.
Step 4: Victor randomly chooses i=1
Step 5: Victor checks that xi≡rei (mod n)
They repeat steps 1 through 5 at least 7 times (since (1/2)7<.01
One way: Step 4: Victor chooses i≠j
Choose r1, r2
2.9710
2.9517
H(P)=−(13log213+23log223)
This system matches up with the one-time pad, and hence H(P|C)=H(P)
H(X)=log236
Use Fermat’s Theorem to obtain H(Y)=0
(3, 2), (3, 5), (5, 2), (5, 5), (6, 2), (6, 5), ∞
(3, 5)
(5, 2)
(2, 2)
She factors 35.
3Q=(−1, 0)
Eve knows rP0, P1, k
Eve now computes H2(gr)
The original message is 0,1,0,0.
The original message is 0,1,0,1.
n=5
(0, 0, 0, 0, 0), (1, 1, 0, 1, 0), (1, 0, 1, 0, 1), (0, 1, 1, 1, 1)
R=log2(4)5=0.4
d(C)=2
13. 1+X+X2+X3
19. The error is in the 3rd position. The corrected vector is (1,0,0,1,0,1,1).
The period is 4.
m=8
r=4