alg2 cryptography hw

Upload: niranjan550550

Post on 04-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Alg2 Cryptography HW

    1/15

    Cryptography.doc 1 CSCI 1321

    You must do at least 90% of this homework without the assistance of anyone else. Once you have 90% ormore of the homework completed, you may double check your answers with a team-mate or study-partner.

    I have completed at least 90% this homework assinment on my own. I!"e reali#e that it is a violation ofacademic interity to share this work with others, either this semester, or after the class is over.

    I!"e reali#e that the penalty for turnin in work that is not my own, or assistin others in doin so, can ranefrom an $$ in the class to dismissal from &rinity 'niversity

    (rint )ame ***************************************** &ime +euired ******.**** rs.

    /inature ***************************************************************

    &eam-ate )ame **********************************************************

    Cryptographyomework12 (oints

    1. ******* In the public-key method of cryptoraphy, which key is publicly known345 6ncryption key only75 8ecryption key only5 7oth85 )one of the above

    :. ******* . 4 cipher is *3*

    45 4n encryption alorithm75 4 decryption alorithm5 4 private key85 ;a5 or ;b5

  • 8/13/2019 Alg2 Cryptography HW

    2/15

  • 8/13/2019 Alg2 Cryptography HW

    3/15

    Cryptography.doc 3 CSCI 1321

    75 ipherte=t5 ryptonite85 (lainte=t

    1D. /****************************** "************************* ryptoraphy meant *3* inBreek

    12. ****************************** *3* is the art and science of transformin messaes to makethem secure and immune to attacks

    1?. ****************************** *3* *3* renders a messae unintelliible to unauthori#edpersonnel.

    1@. ****************************** *3* transforms an intentionally unintelliible messae intomeaninful information.

    1C. ********************** ********************** In cryptoraphy, the encryption!decryptionalorithms are *3* Epublic!secretFG the keys are *3* Epublic!secretF.

    19. ******* E&!F 6very sender!receiver pair needs its own cipher for secure communication.

    :0. ********************** One cipher can serve millions of communicatin pairs throuh the use of *3* Epublic!secretF keys and *3* Epublic!secretF ciphers.

    :1. **********************-key **********************-key 4ll cryptoraphy alorithms can bedivided into two roupsH *3* ;also called secret key5 and *3* ;also called public key5

    ::. **********************-key **********************-key 4ll cryptoraphy alorithms can bedivided into two roupsH *3* ;also called asymmetric key5 and *3* ;also called symmetric key5

    :

  • 8/13/2019 Alg2 Cryptography HW

    4/15

    Cryptography.doc 4 CSCI 1321

    45 &ranslation75 6ncryption!8ecryption5 4uthentication85 ompression

    client.

  • 8/13/2019 Alg2 Cryptography HW

    5/15

    Cryptography.doc 5 CSCI 1321

    D0. ******************************************************** 'sin the more advancedmonoalphabetic cipher key above, encrypt the plainte=t messae L4&&4N )O"M. Jist the cipherte=t.

    D1. ******************************************************** 'sin the more advancedmonoalphabetic cipher key above, decrypt the cipherte=t messae L+ + 8IM. Jist the cipherte=t.

    D:. ******** In monoalphabetic substitution, the relationship between a character in the plainte=t and acharacter in the cipherte=t is *3*.

    45 one-to-one

    75 one-to-many5 many-to-one85 one-to-many

    Dienere cipherrid above, decrypt the cipherte=t L (" S6I&S > O674 &7S 6+S(/N+6&M usin the keyL6&6+)6&M. "rite the plainte=t messae.

    D?. ******* E&!F &here are many collections of letters, and or diits, that can be used for the >ieneresuare!rid.

  • 8/13/2019 Alg2 Cryptography HW

    6/15

    Cryptography.doc 6 CSCI 1321

    D@. ******** In polyalphabetic substitution, the relationship between a character in the plainte=t and acharacter in the cipherte=t is *3*.

    45 one-to-one75 one-to-many5 many-to-one85 one-to-many

    Plaintext Ciphertext

    DC. 'sin the eleven character transpositional cipher key above, encrypt the cipherte=t messaeL+Y(&OB+4(Y I/ &6 4+& 4)8 /I6)6 O &+4)/O+I)B 6//4B6/ &O 4N6 &6/6'+6 4)8 I')6 &O 4&&4N/M. (lace the continuous flow plainte=t on the left and transform it toappropriate cipherte=t on the riht.

    Ciphertext Plaintext

    D9. 'sin the eleven character transpositional cipher key above, decrypt the cipherte=t messae

  • 8/13/2019 Alg2 Cryptography HW

    7/15

    Cryptography.doc 7 CSCI 1321

    LOGYRTCPARPHORAIGYHT LM PAUESLB_RI TAHDC_ENKRES_AERPY_I__T__V__AE M.(lace the continuous flow cipherte=t on the left and transform it to appropriate plainte=t on the riht.

    20. ******* E&!F In symmetric-key cryptoraphy, the same key is used by the sender ;for encryption5 andthe receiver ;for decryption5.

    21. ******************************************************************************* Oneof the maKor advantaes of symmetric-key cryptoraphy is efficiency. "hy are these small keys moreefficient3

    2:. ******************************** One of the maKor disadvantaes of symmetric-keycryptoraphy is that each pair must have a uniue symmetric key. If ) people want to use this method, thereneeds to be *3* symmetric keys. Jist the formula.

    2

  • 8/13/2019 Alg2 Cryptography HW

    8/15

    Cryptography.doc 8 CSCI 1321

    00100010 00011000 = *** *** *** *** *** *** *** *** */*

    00100010 00101000 = *** *** *** *** *** *** *** *** ***

    00100001 01000010 = *** *** *** *** *** *** *** *** ***

    00100010 00100001 = *** *** *** *** *** *** *** *** ***

    00100001 00011000 = *** *** *** *** *** *** *** *** ***

    00100001 01000001 =*** *** *** *** *** *** *** *** ***

    'se the bit-level decoder above, and the 4/II table at the beinnin of this assinment sheet, to decrypt

    the cipherte=t L00100010 00011000 00100010 00101000 00100001 01000010

    00100010 00100001 00100001 00011000 00100001 01000001

    2@. **** &he *3* (-7o= above is used for bit-level encryption and decryption. 45 ompressed 75 6=panded 5 /traiht

    2C. **** &he *3* (-7o= above is used for bit-level encryption and decryption. 45 ompressed 75 6=panded 5 /traiht

    29. **** &he *3* (-7o= above is used for bit-level encryption and decryption. 45 ompressed 75 6=panded 5 /traiht

  • 8/13/2019 Alg2 Cryptography HW

    9/15

    Cryptography.doc 9 CSCI 1321

    ?0. ************************ "hich of the three (-7o=es above would be of little use encryptin te=tand raphic information because of the data loss.

    ?1. *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***

    *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***'se the e=panded p-bo= encoder above, and the 4/II table at the beinnin of this assinment sheet, toencrypt the plainte=t L)'&M. +emember to complete the last byte by fillin in 0Qs.

    ?:. *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****

    *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****

    *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****'se the e=panded p-bo= encoder above, and the 4/II table at the beinnin of this assinment sheet, to

    decrypt the cipherte=t L00010111 10010100 00010101 01010100M. +emember tocomplete the last byte by fillin in 0Qs.

    ?

  • 8/13/2019 Alg2 Cryptography HW

    10/15

    Cryptography.doc 10 CSCI 1321

    ?D. *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****

    *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****

    *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****'se the straiht p-bo= encoder above, and the 4/II table at the beinnin of this assinment sheet, to

    decrypt the cipherte=t L00101111 10100001 10100111M. +emember to complete the lastbyte by fillin in 0Qs.

    ?2. B *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***

    O *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***'se the /-bo= encoder above, and the 4/II table at the beinnin of this assinment sheet, to encrypt

    the plainte=t LGOM.

  • 8/13/2019 Alg2 Cryptography HW

    11/15

    Cryptography.doc 11 CSCI 1321

    ??. *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****

    *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ****'se the /-bo= encoder above, and the 4/II table at the beinnin of this assinment sheet, to decrypt

    the cipherte=t L10110001 10110000M.

    ?@. ********************************** &he bit-level encryption diaram above illustrates a;n5 *3*.

    ?C. In the table for an 6=clusive O+, the followin hold trueH

    6=clusive O+ ;0,05 ***** E0!1F 6=clusive O+ ;0,15 *****E0!1F

    6=clusive O+ ;1,05 *****E0!1F 6=clusive O+ ;1,15 *****E0!1F

    ?9. In the table for an O+, the followin hold trueH

    O+ ;0,05 ***** E0!1F O+ ;0,15 *****E0!1F

    O+ ;1,05 *****E0!1F O+ ;1,15 *****E0!1F

  • 8/13/2019 Alg2 Cryptography HW

    12/15

    Cryptography.doc 12 CSCI 1321

    ) *** *** *** *** *** *** *** *** Y *** *** *** *** *** *** *** ***

    Ney *** *** *** *** *** *** *** *** Ney *** *** *** *** *** *** *** ***

    ipherhar *** *** *** *** *** *** *** *** ipherhar *** *** *** *** *** *** *** ***

    6 *** *** *** *** *** *** *** *** & *** *** *** *** *** *** *** ***

    Ney *** *** *** *** *** *** *** *** Ney *** *** *** *** *** *** *** ***

    ipherhar *** *** *** *** *** *** *** *** ipherhar *** *** *** *** *** *** *** ***

    @0. *********************************************************************** 'se the6=clusive O+ bit-level encryption to encrypt plainte=t L)Y6&M with the Ney L1 1 1 0 0 1 1 1M Jist the completypherte=t messae in the space provided.

    ipherhar *** *** *** *** *** *** *** *** ipherhar *** *** *** *** *** *** *** ***

    Ney *** *** *** *** *** *** *** *** Ney *** *** *** *** *** *** *** ***

    har1 *** *** *** *** *** *** *** *** har: *** *** *** *** *** *** *** ***

    @1. *********************************************************************** 'se the6=clusive O+ bit-level encryption to encrypt plainte=t L10101001 10101000M with the Ney L1 1 1 0 0 1 1 1MJist the complete ipherte=t messae in the space provided.

    *** *** *** *** *** *** *** ***

    T+1U *** *** *** *** *** *** *** ***

    T+:U *** *** *** *** *** *** *** ***

    T+

  • 8/13/2019 Alg2 Cryptography HW

    13/15

    Cryptography.doc 13 CSCI 1321

    / *** *** *** *** *** *** *** ***

    T+1U *** *** *** *** *** *** *** ***

    T+:U *** *** *** *** *** *** *** ***

    T+

  • 8/13/2019 Alg2 Cryptography HW

    14/15

    Cryptography.doc 14 CSCI 1321

    C:. *********************************************************************** &he illustrationabove describes one possible combination of subkeys for the *3* encryption alorithm .

    C

  • 8/13/2019 Alg2 Cryptography HW

    15/15

    Cryptography.doc 15 CSCI 1321

    C9. ******* E&!F In public-key encryption, knowin the encryption alorithm and the key makes it uite easyto crack the decryption alorithm.

    90. **************************************** /uppose the +/4 public key encryptionQs primenumbers were 2 and 1@. "hat is )3

    91. **************************************** /uppose the +/4 public key encryptionQs primenumbers were @ and 1@. "hat is )3

    9:. **************************************** /uppose the +/4 public key encryptionQs primenumbers were 2 and 1@. "hat is A3

    9