1.1 Inverses
1.2 Building Blocks
d) We generally talk about two types of errors in transcribing numbers: either of the type where you write down the wrong number or where you swap the positions of the digits. What is the error-catching capability of Check-Digit Scheme 2? Can it catch ALL possible errors? The following theorem tells. us exactly what errors can be caught. Theorem 2.1. Suppose a number (tor • • a/ satisfies the condition (al, az • • • ak) • (wi, ta21. • • wk) = 0 mod n The single error obtained by substituting a’ for a is undetectable if and only (di — ai)wi is divisible by n. A single swapping error (where ei and aj are swapped) is undetectable if and only if (ai — ai)(wi — wi) is divisible by rt. e) At one point in Querbec, the weighting vector (12,11,10,…,2,1) was used for all drivers’ licenses while Newfoundlanders had the weighting vector (1, 2, 3, 4, 5, 6, 7, 8, 1) applied to their licenses. Which types of errors will the check-digit schemes avoid? (An easier way to answer might be: which ones will they miss? ) What about the ISBN system?
2.2 RSA, Uncovered In the following question we use standard notation to refer to RSA cryptography. a) Why do you need to make the numeric message m into smaller. messages if m > n? Answer this question by giving an example showing what happens when it does not get decomposed into smaller pieces; that is, give an example showing the case where m < n. You should choose a 2-digit n here. b) Demonstrate the importance of using very large numbers when generating keys by deducing the fol-lowing private keys, given the public keys below:
Person 71 e Amen 98662273 1313 Briana 99633329 2791 Cheng 222561187 52107
c) You have to compute a lot of powers when using RSA. How can you more efficiently compute powers like m8 by first computing powers like m2 (called the “square and multiply” technique). Using this technique, how many multiplications do you need to computer m100? Is there a larger power that requires the same number of multiplications?§
littps://www.overleal.com/project/63420ccbb3d93698dff26b40
3.1 Key Exchange The Diffie-Hellman Key Exchange System provides a way for two people – not just the sender of the message – to determine the keyword. Here is the Key Exchange system procedure: 1. Beth and Stephanie agree (Not privately – perhaps over the phone) on a prime number p and some arbitrary integer q with q < p. Since p is prime, gcd(p, q) = 1. 2. Beth and Stephanie privately choose integers b and s respectively with b < p and s < p. 3. Beth computes B = q”( mod p) and Stephanie computes S = q8( mod p). 4. Beth sends B to Stephanie and Stephanie sends S to Beth. 5. Beth computes Sb mod p and Stephanie computes 138 mod p. 6. Beth and Stephanie necessarily come up with the same answer. Call this answer K. 7. By some mutually agreed upon algorithm, the integer K is interpreted as a string of letters, the keyword for the Vigenere encipherment or some other system. I a) Prove that Beth and Stephanie come up with the same answer in step (6). b) In order to determine a key in this system, is it necessary for both Beth and Stephanie to determine primes p, q and integers I), s? Or, can they come up with a key with less information than this? c) How is this system secure? Would you recommend primes or numbers of a certain length? d) You receive the following message:
yasnblifkinvlbaxfj1
Yikes!! BUT… you know that the keyword is generated by a Diffie-Hellman key exchange with p = 4576384930643, q = 64783087731, and the private keys are 476388475629 and 2243552788. Suppose that the mutually agreed upon algorithm to interpret the integer K as a string of letters is the following: • If K contains an odd number of digits, add a 0 to the end • Decompose K into groups of two digits • Compute the value of each two-digit block mod 26 • Determine the letter occupying each alphabetic position in this string of letters (with A=1). Use this information to find the plaintext message.
!This explanation comes from Lewand