This home-exam must be done individually. Copying others complete or partial work is strictly prohibited. You may, of course, discuss the problems with fellow students,
The solutions should be written in a word processor program or a program like LaTeX and your work should be submitted as a PDF le. Your work should be well-structured and justi ed, as well as they should be easy to read.
If you use a computer program to solve some tasks, a program listing together with
You need to make an own e ort to solve the tasks. Utilizing online available tools or algorithms as part of your work is strictly prohibited.
it is done. (1 pts/task)
47c (53a 2 + b5) (mod 83)
ordering of the English alphabets where A $ 0; B $ 1; ; z $ 25 are used. (2 pts/task)
Assume that we have three a ne ciphers
ek1(x) = a1x + b1 ek2(x) = a2x + b2 ek3(x) = a3x + b3:
There is a single a ne cipher ek(x) = ax + b which performs exactly the same encryption (and decryption) as the combination ek3(ek2(ek1(x))).
xn+5 = xn+4 + xn+2 + xn+1 + xn (mod 2); n 0
where the initial values are the key generated in (a).
0$0=00000
1$1=00001
2$2=00010
...
5$5=00101
a $ 6 = 00110
b $ 7 = 00111
...
z $ 31 = 11111
We happen to know the following fact about the system.
The degree of the LFSR is m = 4.
m1zugjca3fa0jzremxm
Answer the following tasks. (2pts/task)
ek(x) = ax + b (mod n) and dk(y) = a 1(y b) (mod n):
For this task, Bob and Alice wants exchange message over eld Z29 by using the standard ordering of English alphabets, where a $ 0; b $ 1; : : : ; z $ 25 followed by
| 0 |
| !$26; | ;$ 27 | and | ?$28: | 1 |
| ||||||
| 5 | 6 | 17 | 7 | 23 | 1 |
|
|
| 0 | 15 |
| ||
| B | 3 | 12 | 7 | 0 | 11 | C |
|
|
| B | 8 | C |
|
Use the key = | 9 | 3 | 2 | 11 | 8 | and |
| = | 9 | . | ||||
| B |
|
|
|
|
| C |
|
|
| B |
| C |
|
a | B | 1 | 12 | 4 | 5 | 19 | C |
| b |
| B | 10 | C |
|
| 12 | 1 | 0 | 21 | 27 |
|
|
| 23 |
| ||||
| B |
|
|
|
|
| C |
|
|
| B |
| C |
|
| @ |
|
|
|
|
| A |
|
|
| @ |
| A |
|
(c) Decrypt the ciphertext: miyslfdubrqdivxin?qs. (2pts/task)