Sample Questions
Sample Questions
Sample Questions
1) (10 pts) Consider a substitution cipher where 52 symbols were used instead of 26. In
particular, each symbol in the cipher text is for either a lowercase English letter, or an
uppercase English letter. (For example, let E be the encryption function then we could
have E(‘S’) = ‘p’ and E(‘s’)=’m’.) Such a modification augments the key space to 52!
Does this provide added security compared to a standard substitution cipher? Why or
why not?
This does not add much security to the system at all. Capital letters usually appear
only at the beginning of words at the beginning of sentences. Thus, the frequencies
of capital letters are quite small in English text. You could simply consider this
while using frequency analysis. Simply put, disregard all the characters of very
small frequencies and concentrate on solving for the characters with the highest
frequencies which will still be the same lowercase letters. Once these are solved for,
there will be enough recovered plaintext to deduce most if not all of the capital
letters in the message.
2) (10 pts) You have found one small piece of matching plaintext and ciphertext for a
Hill cipher using a 2x2 matrix key with mod 17 entries. In particular, the plaintext (12, 5)
maps to the ciphertext (14, 10). (Note that these entries typically appear as column
vectors when the encryption is applied.) Using this given information and nothing else,
how many possible keys could there be? List two of these possible keys.
a b
Let the encryption matrix be
. Then we have the following equations:
c d
12a + 5b = 14 mod 17
12c + 5d = 10 mod 17
Now, notice that plugging in each of the 17 possible values of b yields a solution for a
and plugging in each of the 17 possible values of d yields a solution for c. Thus, the
total possible number of keys seems to be 17*17 = 289. But, some of these keys give a
determinant equivalent to 0 mod 17, which is not permissible. To see this, using the
equations above and solving for the determinant ad-bc eventually yields the
expression: 8+2b+4c. We can set this to 0, and quickly show that there are 17
combinations of values for b and c that have this equal to 0. (Once b and c are set, so
are a and d.) Thus, we must subtract 17 from our original answer to yield a final
answer of 272 possible total keys. To find two of these, simply plug in two sets of
values for a and b above and one set of values for c and d. For example:
a = 4+b (mod 17), two solutions to this are a=5,b=1 and a=6,b=2.
The other equation simplifies to d = 2+c (mod 17). One solution to this is d=3, c=1.
So two possible keys are
5 1 6 2
1
and
1
3 3
(Note: I skipped several algebra steps including finding inverse to shorten this
explanation. If you want to see these steps, please come to my office. This question
was slightly more difficult than I intended. So, I will only take off 1 pt. of credit if an
answer of 289 was given to the first question.)
3) (10 pts) Let R be the ring defined by polynomials with coefficients in Z2 with all
computations reduced modulo x6+1. Which of the following properties also hold for R?
Prove your answers.
a) Multiplicative Identity
b) No zero divisors
c) Multiplicative Inverse
Similarly, R can not have a multiplicative inverse. GCD(x+1, x 6 +1) = x+1, thus it is
impossible to find a polynomial f(x) such that (x+1)*f(x) ≡ 1 mod (x6+1)
4) (10 pts) What is the value of 123241 mod 35? (Please give your answer as an integer in
between 0 and 34, inclusive.) Full credit will only be given if you calculate this value
efficiently, using information presented in class.
123 ≡ 18 so 123241 ≡ 18241 mod 35. Also note that φ (35) = (5-1)(7-1) = 24. Thus, for a
given a relatively prime with 35, we have a24 ≡ 1 mod 35. Thus,
5) (10 pts) Brian uses an RSA system with public keys n (the modulus) and e 1 (public
exponent) with a matching private key d1. Brian creates RSA keys for his friend Meg
using the same public key n, but a different public exponent e2 and matching private
exponent d2. While Brian was being careless, you discover the values of d1 and d2.
Though you do not wish to read message intended for Brian or Meg, you do wish to read
messages directed towards Sarah, who also uses the public modulus n with the public
exponent e3. Outline a strategy that may help uncover Sarah's private exponent, d3.
We know that e1d1 ≡ 1 mod φ (n) and e2d2 ≡ 1 mod φ (n). Thus, we also know that
φ (n) | (e1d1 - 1) and φ (n) | (e2d2 - 1). Since we know e1, d1, e2, and d2. We can
calculate the quantities (e1d1 - 1) and (e2d2 - 1). We also know that gcd((e1d1 - 1), (e2d2
- 1)) ≥ φ (n). Thus, we can simply run Euclid’s algorithm on the two numbers, and
get an output value that is some multiple of φ (n). With any luck, it will be a small
multiple and we can guess the value of φ (n), allowing us to determine d3, from e3.
6) (15 pts) Given the following input matrix to the MixColumns transformation of the
AES cipher, produce the term in the fourth row and fourth column of the output matrix.
3E DA 10 97
2 D 78 13 BB
A2 65 11 92
41 22 45 F9
We must calculate the entry in the fourth row and column of the product
02 03 01 01 3E DA 10 97
01 02 03 01 2 D 78 13 BB
01 x
01 02 03 A2 65 11 92
03 01 01 02 F9
41 22 45
Of these, the first and last terms must be reduced by the polynomial m(x) listed on
page 148 of the text. Here are the relevant calculations:
1010 0010
1011 1011
1001 0010
1110 1001
-------------
0110 0010, which is 62 in hex notation.
7) (15 pts) Let M' be the bitwise complement of M and let K be a DES key with bitwise
complement K'. Prove that the bitwise complement of the DES encryption of M using
key K is the DES encryption of M' using K'. (Mathematically, prove that if Y =
DESK(M), then Y' = DESK'(M').)
We will show that if each round of DES with key K and message M yields
subcomputations Li and Ri, then each round of DES with key K' and message M'
yields subcomputations Li' and Ri'.
Clearly, we must have L1' as a subcomputation with K' and M', since this value is
really just R0', which is simply the corresponding permutation of the bits from M' as
R0 is of bits in M.
Now, the key will be to show that R1' is the proper subcomputation with K' and M'.
First we will show that if Z = X ⊕ Y, then Z' = X' ⊕ Y. To see this, simply note that
we must flip every bit in Z to get Z'. In essence, we have Z ⊕ (11...11) = Z'. (Note
that (11..11) simply represents a bitstring of all 1's of the same length as Z.) Now,
simply solve for the right hand side of the second equation:
X' ⊕ Y = (X ⊕ (11..11) ⊕ Y)
= (X ⊕ Y) ⊕ (11..11)
= Z ⊕ (11..11)
= Z'.
The proof for showing that all the other L i's and Ri's follow the same pattern is
identical to this proof. (Since we have shown that one round of DES preserves this
property.) Thus, we have shown that if Y = DESK(M), then Y' = DESK'(M').