Exercises 11.8 Exercises
1.
Do all the encryptions and/or encodings in Sections 11.1 and 11.2 βby handβ.
2.
Encrypt your name using an affine method (
3.
Create your own
4.
Use the Diffie-Hellman method of encryption to encrypt a short (three to five character) message with a
5.
Draw a diagram and show that if Eve has control of both communications in Diffie-Hellman key exchange (Algorithm 11.4.2), she can intercept and decrypt all messages.
6.
Do this two-parter:
Suppose you discovered that the message 4363094, where
actually represented the (numerical) message 2718. What steps might you take to try to discoverSuppose that you discovered in the previous part by hard work that
Now quickly decrypt the message 6618138.
7.
Pick two primes between 1000 and 2000 and create an RSA public key
8.
Suppose that
Encrypt a (short) message.
Find the decryption key
for this situation, and decrypt your message.Use
to sign your name!
9.
Come up with your own RSA public-key system by choosing
10.
Construct a secret and share it in the way described in Algorithm 11.7.1.
11.
Learn about a symmetric key cryptosystem in common use. Do you own any devices which use it?
12.
Learn about the El-Gamal public key encryption method. How is it implemented? What mathematics used there is similar to what is used in this chapter? What is different?
13.
Learn about the Advanced Encryption Standard. How is the mathematics used there different from what is used in this chapter?
14.
Examine the code for encode
and decode
throughout, or have your instructor explain it. If you were trying to encode real human communication, what improvements would you like to make to these? Could you implement them, and how?
15.
In Example 11.7.2, explain mathematically the necessity of the Sage comment # First line: turn modular integers back into integers
just before the invocation of the Chinese Remainder Theorem with CRT
.