COT5937Lec12 - Cryptography(COT 5937) Lecture 12 6/26/01...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Cryptography(COT 5937) Lecture 12 6/26/01 Solutions to previous contest problems: 1) φ (18338400) = φ ((2 5 )(3 4 )(5 2 )(283)) = (2 5 – 2 4 )(3 4 – 3 3 )(5 2 – 5 1 )(283 – 1) = 4872960 2) n = (17)(19), φ (n) = (17 – 1)(19 – 1) = 288 e 2 because gcd(288,2) > 1. Similarly, e 3 and e 4. But, e=5 is a viable solution. Now, we need to solve 5d 1 (mod 288) for d. Using the extended Euclidean Algorithm or otherwise, we find that d=173 is the corresponding decryption key. Probabilistic Primality Testing First we need to introduce the idea of a probabilistic algorithm. What is most strange about this kind of algorithm is that it does not necessarily produce the correct answer to a question. However, within some tolerance (or probability) it will produce a correct response. (ie. ½ of the answers will be correct. ..) This does not seem very useful, but we can indeed repeatedly run these algorithms to increase our likelyhood of correctness for certain types of problems. Probabilistic algorithms are typically designed for problems that have no known polynomial time solution. (If you can’t solve the problem exactly in a given amount of time, you might as well try to approximate the solution. ..) For our purposes, we will only define a Monte Carlo algorithm, which is one type of
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 07/14/2011.

Page1 / 3

COT5937Lec12 - Cryptography(COT 5937) Lecture 12 6/26/01...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online