THE UNIVERSITY OF CALGARY
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS & STATISTICS
MIDTERM EXAMINATION
FALL 2011 Solution Key
CPSC/PMAT 418 L01
November 7, 2011
Time: 50 minutes
NAME:
COURSE (circle one):
CPSC 418
PMAT 418
CPSC/PMAT 418 Final Exam Study Guide
General remarks
CPSC 418 and PMAT 418 will have identical nal exams.
You will be examined on all the material of the course, but the emphasis will be on material
that was not examined on the midterm exam.
It is more
THE UNIVERSITY OF CALGARY
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS AND STATISTICS
FINAL EXAMINATION
CPSC/PMAT 418 L01 Introduction to Cryptography
Fall 2011
December 12, 2011, 12:00 - 15:00
I.D. NUMBER
Time: 3 hours
SURNAME
OTHER NAMES
STU
Week 1
Introduction, Motivation,
Terminology
1.1
About the Course
Cryptography (from the Greek) hidden writing
1.1.1
Motivation
What would you like to see in a secure electronic assignment submission system? Want submission
condential so no one can steal
THE UNIVERSITY OF CALGARY
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS & STATISTICS
MIDTERM EXAMINATION
FALL 2011 Solution Key
CPSC/PMAT 418 L01
November 7, 2011
Time: 50 minutes
NAME:
COURSE (circle one):
CPSC 418
PMAT 418
Week 1
Introduction, Motivation,
Terminology
1.1
About the Course
Cryptography (from the Greek) hidden writing
1.1.1
Motivation
What would you like to see in a secure electronic assignment submission system? Want submission
condential so no one can steal
THE UNIVERSITY OF CALGARY
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS AND STATISTICS
FINAL EXAMINATION SOLUTION KEY
CPSC/PMAT 418 L01 Introduction to Cryptography
Fall 2011
December 12, 2011, 12:00 - 15:00
I.D. NUMBER
Time: 3 hours
SURNAME
OT
Binary operations on sets:
Closure under .:
a,b in G then a.b in G
Associativity:
(a.b).c=a.(b.c)
Unitary Element:
There is u such that: a.u=a
Inverses:
For any a, there exists b such that a.b=u
3
Example: (Z, +) - (Q,+) (Q,*) - (R, +) - (R, *)
Any
Math 2
Information Theory
Sebastian Lindner
CPSC418- UCalgary
FALL2014
What we are going to
learn:
- Probability Theory
- Prefect Secrecy
- Information Theory
Quick Terms
- Computational Security:
Oscar must use computational effort to break a
cryptosyste
Outline
CPSC/PMAT 418 Introduction to Cryptography
Product Ciphers, Block Ciphers, DES
1
Product Ciphers
Renate Scheidler
2
Block Ciphers
Department of Mathematics & Statistics
Department of Computer Science
University of Calgary
3
The Data Encryption Sta
Outline
CPSC/PMAT 418 Introduction to Cryptography
More on Perfect Secrecy, One-Time Pad, Entropy
1
Computing p(C |M) and p(C )
Department of Mathematics & Statistics
Department of Computer Science
University of Calgary
2
The Vernam One-Time Pad
(Original
CPSC/PMAT 418 Midterm Exam Study Guide
Midterm exam format
Multiple choice questions
Yes/no questions (with no explanations required)
Denitions
Short answer questions one sentence, a theorem, a brief explanation
Very simple computations, verications
THE UNIVERSITY OF CALGARY
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS & STATISTICS
MIDTERM EXAMINATION
FALL 2011
CPSC/PMAT 418 L01
November 7, 2011
Time: 50 minutes
NAME:
COURSE (circle one):
CPSC 418
PMAT 418
Please DO NOT
CPSC/PMAT 418 Midterm Exam Study Guide
Midterm exam format
Multiple choice questions
Yes/no questions (with no explanations required)
Denitions
Short answer questions one sentence, a theorem, a brief explanation
Very simple computations, verications
THE UNIVERSITY OF CALGARY
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS & STATISTICS
MIDTERM EXAMINATION
FALL 2011
CPSC/PMAT 418 L01
November 7, 2011
Time: 50 minutes
NAME:
COURSE (circle one):
CPSC 418
PMAT 418
Please DO NOT
THE UNIVERSITY OF CALGARY
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS AND STATISTICS
FINAL EXAMINATION
CPSC/PMAT 418 L01 Introduction to Cryptography
Fall 2011
December 12, 2011, 12:00 - 15:00
I.D. NUMBER
Time: 3 hours
SURNAME
OTHER NAMES
STU
THE UNIVERSITY OF CALGARY
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF MATHEMATICS AND STATISTICS
FINAL EXAMINATION SOLUTION KEY
CPSC/PMAT 418 L01 Introduction to Cryptography
Fall 2011
December 12, 2011, 12:00 - 15:00
I.D. NUMBER
Time: 3 hours
SURNAME
OT
CPSC/PMAT 418 Final Exam Study Guide
General remarks
CPSC 418 and PMAT 418 will have identical nal exams.
You will be examined on all the material of the course, but the emphasis will be on material
that was not examined on the midterm exam.
It is more
CPSC/PMAT 418 Midterm Exam II Study Guide
General remarks
CPSC 418 and PMAT 418 will have identical exams.
No aids will be allowed; this includes notes, books, handouts, internet access and calculators.
The material that you will be examined on is describ
Outline
CPSC/PMAT 418 Introduction to Cryptography
1
Attacks Revisited
2
Introduction
3
Department of Mathematics & Statistics
Department of Computer Science
University of Calgary
Substitution Ciphers
Monoalphabetic Substitution Ciphers
Polyalphabetic Sub
Math 1
Modular Arithmetic
Sebastian Lindner
CPSC418- UCalgary
FALL2015
What we are going to
learn:
- Ceasars Cipher
- Modular arithmetic.
- Division vs Modulo
- Congruence Classes and Residues
- Multiplicative inverses.
- Extended Euclidean Algorithm
Encr
Outline
CPSC/PMAT 418 Introduction to Cryptography
1
Vernam One-Time Pad
2
Entropy
3
Product Ciphers
4
Error Propagation
5
Block Ciphers
6
The Data Encryption Standard
History of DES
One-Time Pad, Entropy, Product Ciphers, Block Ciphers
Renate Scheidler
D
Outline
CPSC/PMAT 418 Introduction to Cryptography
Introduction, Basic Terminology, Classical Ciphers
Renate Scheidler
1
Course Technicalities
2
Overview of Cryptography
3
Cryptography as Part of Information Security
4
Encryption and Decryption
Symmetric
Outline
CPSC/PMAT 418 Introduction to Cryptography
Public-Key Cryptography and RSA
Renate Scheidler
Department of Mathematics & Statistics
Department of Computer Science
University of Calgary
1
The Power Algorithm (Binary Exponentiation)
2
Public-Key Cryp
Outline
CPSC/PMAT 418 Introduction to Cryptography
Two Real-Life Applications, Elliptic Curve Crypto, Current and Future
Trends
1
Two real-life applications
Secure e-mail via PGP
Access control via SSH
2
Elliptic curve cryptography
3
Future directions in