Professional Documents
Culture Documents
Cryptography Assignment
Cryptography Assignment
Cryptography Assignment
a) preimage resistance
b) Φ(32) 16
c) Φ(125) 100
d) Φ(187) 186
e) Φ(495) 240
7. What is called a 1024-bit RSA key? Why not using shorter keys? Why not using
longer ones?
8. Is a modular inverse always an integer?
9. Explain why it is advantageous to RSA decrypt in CRT mode rather than in standard
mode.
10. What is the usual method to compute a modular inverse? Explain.
11. Is AES a Feistel network?
12. What are the two commonly used chaining modes? Describe how they work.
13. Is the SQUARE attack a known message or a chosen message one?
a) sign a document?
e) optimize a cryptanalysis?
f) be sure that a document has not been modified during its transmission?
15. Describe the RSA Standard Key Generation. Using it to generate a 20-bit RSA key for the
public exponent e = 11 and encrypt/decrypt message m=123456.
16. Express the Chine Remainder Theorem (CRT) then find x such that
x ≡ 2 (mod 3)
x ≡ 3 (mod 5)
x ≡ 2 (mod 7)
17. Describe the RSA CRT Key Generation. Using it to generate a 20-bit RSA key for the
public exponent e = 11 and encrypt/decrypt message m=123456.
b) −57 mod 10 7
c) 263 mod 6
22. Express the Bezout’s Theorem. Using the Extended Euclid Algorithm to find s and
t such as as + bt = d =gcd(4864, 3458).