Cryptography, CPSC/PMAT 669
ASSIGNMENT 3 SOLUTIONS
Problem 1 (A meet-in-the-middle attack on RSA using small messages).
A common use of public-key cryptosystems is to encrypt and send a symmetric key to be
used for bulk data encryption; this is known as h
Cryptography, CPSC/PMAT 669
ASSIGNMENT 2 SOLUTIONS
Problem 1 (Discrete logarithms with respect to dierent generators).
Let G be a nite cyclic group. The discrete logarithm problem (DLP) in G requires nding
x (mod |G|), given u, g G with g a generator of G
M7312," Wt! 1% C30 um T1 \fQ.
CW L L; areas/m lgtTLoA
2 'q/LULWLQQ C.-1_c.h\9\
pf r4. LON I
"a Ni ii
hinO'LQmJWS 3&ka [(1% gm ,9/éL/wQ-J' V
MWWLL (3/. 5/2M7L.Q Lacq.{}% no a. duct/M)
: :nC/WJUIHES bLQLL: 73ng WNLI<L£4 Emit mm - Ti.g&._mrg_b&
N m 33cm «
Bus
905 "nu W m a-L Wan-L) F6; cm of,
M Ob Magma-{Md twflfAQ/MDJ WLU Lg I
(M/Ki ' m a, W «(4}ZCM «4.4. (V/WU
pm, p 74M;- {2243/14 Mk an
[Wt/8, my; (1
C LWW ctrms mi; a [5-
43J s viz/Mk
b {3T [email protected]_ pQ-f Fox/Wick Cc;
{50g wd %\)M 11 WW («A 036» NAT
1 . )V? W
w (4 [305 OkuCQ-a v1 {561 Tim
t- Bu. 1C Pit-HQ Bus C. gtvtXCR Bug arcaqmgaTLox/x]
wajg mgM PC
2, ue bug cry-«~1on Ttom
U J \
Exmqu LG M&C\MTO_§£]
\ *- NU US {J'rymjwm TWAMH'ET
- 5 c. s '1; 8 u 5 Fa,» / O wr We BMR/ CPU 'Wa/f Te) WETkc!
ak W
Cryptography, CPSC/PMAT 669
ASSIGNMENT 1 SOLUTIONS
Problem 1 (Key size versus password size).
ASCII, short for American Standard Code for Information Interchange, is a method for
encoding any character into a string of 7 bits. For example, the ASCII codes