Page 326 - Discrete Mathematics and Its Applications
P. 326

4.6 Cryptography  305


                              20. Express the Vigenère cipher as a cryptosystem.  29. Describe the steps that Alice and Bob follow when they use

                              To break aVigenère cipher by recovering a plaintext message from  the Diffie-Hellman key exchange protocol to generate a shared
                              the ciphertext message without having the key, the first step is to  key. Assume that they use the prime p = 23 and take a = 5,
                              figure out the length of the key string. The second step is to figure  which is a primitive root of 23, and that Alice selects k 1 = 8
                              out each character of the key string by determining the correspond-  and Bob selects k 2 = 5. (You may want to use some compu-
                              ing shift. Exercises 21 and 22 deal with these two aspects.  tational aid.)
                              21. Suppose that when a long string of text is encrypted using  30. Describe the steps that Alice and Bob follow when they use
                                 a Vigenère cipher, the same string is found in the ciphertext  the Diffie-Hellman key exchange protocol to generate a shared
                                 starting at several different positions. Explain how this infor-  key. Assume that they use the prime p = 101 and take a = 2,
                                 mation can be used to help determine the length of the key.  which is a primitive root of 101, and that Alice selects k 1 = 7
                                                                                     and Bob selects k 2 = 9. (You may want to use some compu-
                              22. OncethelengthofthekeystringofaVigènerecipherisknown,  tational aid.)
                                 explain how to determine each of its characters. Assume that
                                 the plaintext is long enough so that the frequency of its let-  In Exercises 31–32 suppose that Alice and Bob have these
                                 ters is reasonably close to the frequency of letters in typical  public keys and corresponding private keys: (n Alice ,e Alice ) =
                                 English text.                                    (2867, 7) = (61 · 47, 7),  d Alice = 1183  and  (n Bob ,e Bob ) =
                                                                                  (3127, 21) = (59 · 53, 21), d Bob = 1149. First express your an-
                             ∗ 23. Show that we can easily factor n when we know that n is the  swers without carrying out the calculations. Then, using a com-
                                 product of two primes, p and q, and we know the value of  putational aid, if available, perform the calculation to get the
                                 (p − 1)(q − 1).
                                                                                  numerical answers.
                              In Exercises 24–27 first express your answers without computing
                              modular exponentiations. Then use a computational aid to com-  31. Alice wants to send to all her friends, including Bob, the mes-
                              plete these computations.                              sage “SELL EVERYTHING” so that he knows that she sent
                                                                                     it. What should she send to her friends, assuming she signs
                              24. Encrypt the message ATTACK using the RSA system with  the message using the RSA cryptosystem.
                                 n = 43 · 59 and e = 13, translating each letter into integers
                                 and grouping together pairs of integers, as done in Example  32. Alice wants to send to Bob the message “BUY NOW” so that
                                 8.
                                                                                     he knows that she sent it and so that only Bob can read it.What
                              25. Encrypt the message UPLOAD using the RSA system with  should she send to Bob, assuming she signs the message and
                                 n = 53 · 61 and e = 17, translating each letter into integers  then encrypts it using Bob’s public key?
                                 and grouping together pairs of integers, as done in Example
                                 8.                                               33. We describe a basic key exchange protocol using private key
                                                                                     cryptography upon which more sophisticated protocols for
                              26. What is the original message encrypted using the RSA sys-  key exchange are based. Encryption within the protocol is
                                 tem with n = 53 · 61 and e = 17 if the encrypted message is  done using a private key cryptosystem (such as AES) that is
                                 3185 2038 2460 2550? (To decrypt, first find the decryption  considered secure. The protocol involves three parties, Alice
                                 exponent d, which is the inverse of e = 17 modulo 52 · 60.)  and Bob, who wish to exchange a key, and a trusted third party
                                                                                     Cathy. Assume that Alice has a secret key k Alice that only she
                              27. What is the original message encrypted using the RSA system
                                                                                     and Cathy know, and Bob has a secret key k Bob which only he
                                 with n = 43 · 59 and e = 13 if the encrypted message is 0667
                                                                                     and Cathy know. The protocol has three steps:
                                 1947 0671? (To decrypt, first find the decryption exponent d
                                 which is the inverse of e = 13 modulo 42 · 58.)     (i) Alice sends the trusted third party Cathy the message “re-
                                                                                     quest a shared key with Bob” encrypted using Alice’s key
                             ∗ 28. Suppose  that  (n, e)  is  an  RSA  encryption  key,  k Alice .
                                 with n = pq where p and q are large primes and
                                                                                     (ii) Cathy sends back to Alice a key k Alice,Bob , which she gen-
                                 gcd(e, (p − 1)(q − 1)) = 1. Furthermore, suppose that d
                                                                                     erates, encrypted using the key k Alice , followed by this same
                                 is an inverse of e modulo (p − 1)(q − 1). Suppose that
                                       e
                                 C ≡ M (mod pq). In the text we showed that RSA de-  key k Alice,Bob , encrypted using Bob’s key, k Bob .
                                                             d
                                 cryption, that is, the congruence C ≡ M(mod pq) holds
                                                                                     (iii)Alice sends to Bob the key k Alice,Bob encrypted using k Bob ,
                                 when gcd(M, pq) = 1. Show that this decryption congruence
                                                                                     known only to Bob and to Cathy.
                                 also holds when gcd(M, pq) > 1. [Hint: Use congruences
                                 modulo p and modulo q and apply the Chinese remainder   Explain why this protocol allows Alice and Bob to share
                                 theorem.]                                           the secret key k Alice,Bob , known only to them and to Cathy.
   321   322   323   324   325   326   327   328   329   330   331