Determine whether x is even or odd

Assignment Help Computer Network Security
Reference no: EM131299400

1. If a number n is composite but in the Miller-Rabin algorithm Test (n,a) outputs "n is probably prime" (see the textbook page 178https://calclab.math.tamu.edu/~rahe/2014a_673_700720/Trappe_2006.pdf), then a is said to be a false Miller-Rabin witness for n. Show that 2 is a false Miller-Rabin witness strong for 2047.

2. Let p = 101 (note that 101 is a prime number). It is known that 2 is a primitive root of 101. For any number n in the range {1,2,..., 100}, we denote by L2(n) the value k ∈ {1,2,..., 100} such that 2k = n (mod 101) (i.e., L2(n) is the discrete log of n mod 101).

a) What is L2(1)? Justify your answer. (Note: The answer k= 0 is not valid, because k has to be in the set {1,2,..., 100} ).

(b) Using the fact that L2(3) = 69, determine L2(9). Justify your answer.

3. It can be shown that 5 is a primitive root for the prime 1223. You want to solve the discrete logarithm problem 5^x = 3 (mod 1223).

Given that 3^611 = 1 (mod 1223), determine whether x is even or odd. Follow the below step for correct answers

Hints: First see how much is 5611 x (mod 1223) using the information given in the problem. Then use the fact that the equation y2 = 1 (mod 1223) has the solutions 1 and -1. Next let y = 5611 (mod 1223). How much is y2 (mod 1223) (recall that 1223 is prime) ? How much is y?

Reference no: EM131299400

Questions Cloud

What impact would given have on the total flow of cars : What impact would this have on the total flow of cars? Would the total flow of cars increase by 400 cars per hour?
Describe the design of a matched pairs experiment : The reading of the scale shows the force exerted. Describe the design of a matched pairs experiment to compare the strength of the right and left hands, using 10 right handed people as subjects. (You need not actually do the randomization.)
Is the diagnosis a treatment variable or a block : Doctors and nurses. Nurse practitioners are nurses with advanced qualifications who often act much like primary care physicians. An experiment assigned 1316 patients who had no regular source of medical care to either a doctor (510 patients) or a ..
Compute the tax refund or taxes to be paid for 2016 : Download the schedules from the IRS website and prepare the following: Schedule A, B, C, D and E. Complete the 1040 and compute the tax refund or taxes to be paid for 2016
Determine whether x is even or odd : It can be shown that 5 is a primitive root for the prime 1223. You want to solve the discrete logarithm problem 5^x = 3 (mod 1223). Given that 3^611 = 1 (mod 1223), determine whether x is even or odd. Follow the below step for correct answers.
Reduce greenhouse gas emissions : 1) Will the need to reduce greenhouse gas emissions such as carbon dioxide kill certain industries? 2) What happens to a utilities Marginal Costs (MC) as they are compelled to reduce carbon emissions?
How many explanatory variables are there : How many explanatory variables are there? How many treatments? Use a diagram like Figure 6.1 to describe the treatments. How many experimental individuals does the experiment require?
Explain the development of post-world war ii : Explain the development of post-world war II American foreign policy in the era 1945-1965 - What challenges did the country face abroad? What was the general doctrine?
Draw the shear force and bending moment diagrams : MECT 6322 - Computer Aided Engineering Deflection and reactions at the nodes and Draw the shear force and bending moment diagrams (using FEM) - Find the exact solution for the velocity profile.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Management of cybersecurity

Submit a list of five cybersecurity breach case studies. For each breach, write a brief statement covering the following points:

  Choose appropriate security controls

Choose appropriate security controls from the SAN's 20 critical security controls and choose the remainder of controls that are needed to secure this system from the listing of controls provided from NIST 800-53 rev 4

  Identify types of network vulnerabilities and attacks

Identify types of network vulnerabilities and attacks from inside and outside people affecting the network and its performance. The general structure ofthe network security policy that covers all aspects of network that need to be secured and covere..

  Explain main targets seem to be larger or smaller companies

Research three recent information security breaches. Do the main targets seem to be larger or smaller companies? Is there a particular industry that seems predominately targeted?

  Ecological home network an overview ecological home

ecological home network ltbrgtan overview and ecological home network ltbrgtan overview ecological home network

  Describe copyright-public domain and fair use

Briefly describe copyright, public domain, and fair use. Provide a unique example of fair use. Provide an example of when copyright would be violated. Be sure not to duplicate an example that is already posted by one of your classmates times roman..

  Encryption in investigations

Encryption in Investigations-Discuss in your own words the effects that encryption can have on incident response activities, and explain how the use of encryption technologies could prove to be detrimental to an investigation

  Generate a key for some email addresses

Generate a public and private key pair for yourself. If you have any problem in installing it properly, please discuss this in the project folder.

  Assignment on securing the scene

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance inform..

  Business continuity plan or disaster recovery plan

In order for an organization to develop an effective business continuity plan or disaster recovery plan, it must know what information assets it has, their impact on business operations, and the criticality and priorities associated with the infor..

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Standard for public-key certificate formats

Standard for public-key certificate formats. X.509 specifies an authentication protocol. The original version of X.509 contains a security flaw.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd