SIT281 Cryptography Assignment

Assignment Help Computer Engineering
Reference no: EM133001064

SIT281 Cryptography - Deakin University

GUILLERMO PINEDA-VILLAVICENCIO

INSTRUCTIONS
This is an individual assignment. The aim of the assignment is that the student applies concepts and methods studied in weeks 6-7 to solve problems on the Advanced Encryption Standard, discrete logarithms, ElGamal public-key system, and the Diffie-Hellman key exchange.

PROBLEMS

Problem (1) This question is about the Advanced Encryption Standard.

(a) In the SubBytes transformation, each of the bytes of an input matrix is changed to another byte by the Table 8.1 of the textbook (S-Box table). In the question, we compute two entries of this table. In this table, if you are given the byte abcdefgh, then you look for the entry in the abcd row and the efgh column. The rows and columns are numbered from 0 to 15. Compute the relevant entries of the S-Box table for the given bytes 10110101 and 00000000.
Note: You need to compute the relevant entries in the table. No marks will be given for directly quoting the values in the S-Box table.

(b) In the MixColumns Transformation, an input matrix is multiplied by a fixed matrix, and the resulting matrix is the output. Here the addition and mul- tiplication is done in GF (28). Compute the missing entries of the resulting matrix. Give your answer in hexadecimal base, as the other entries of the matrix.

656_figure.jpg

Recall that in these matrices 02 = 00000010 = x and 1A = 00011010 = x4 + x3 + x.

Problem (2) Alice and Bob has designed a public key cryptosystem based on the ElGamal. Bob has chosen the prime p = 73 and the primitive root α = 5. Bob's private key is an integer b = 60 such that β ≡ αb ≡ 65 (mod p). Bob publishes the triple (p, α, β).
(a) Alice chooses a secret number k = 30 to send the message 123456 to Bob. What pair or pairs does Bob receive?
(b) Do you think that Alice should have chosen k = 30? Give an answer and justify it.
(c) What should Bob do to decrypt the pair or pairs he received from Alice? During computation, make sure Bob does not compute any inverses.
(d) Verify the answer of Parts (a) and (c) in sagemath.

Problem (3) This exercise is about the Diffie-Hellman exchange protocol. Alice and Bob agrees to use the public prime p = 1009 and the public primitive root α = 11. Alice also chooses a secret random number x = 101. And Bob chooses a secret random number y = 41.
(a) Describe what information Alice and Bob send each other. Justify your an- swer.
(b) Determine the shared secret that each obtains.
(c) Suppose that Eve witnesses this entire exchange, the information that Alice sent to Bob, the information that Bob sent to Alice, and the public informa- tion of this exchange. Eve cannot compute discrete logarithms directly, but she is able to compute modular exponentiation with positive exponents only. Describe how she can obtain Alice's and Bob's shared secret; this involves solving the necessary equations that Eve should solve.

Problem (4) This problem computes discrete logarithms.
(a) Describe a Baby Step, Giant Step attack to find x in 5x ≡ 46 (mod 47).
(b) In this exercise you will independently study the Pohlig-Hellman algorithm (Section of 10.2.1 of the textbook). Apply the Pohlig-Hellman algorithm to find y in 5y ≡ 20 (mod 47).
(c) Without using a Baby Step, Giant Step attack or the Pohlig-Hellman algo- rithm, compute manually 5z ≡ 27 (mod 47).
Note: In this question, you may use sagemath to compute the in- termediate modular exponentiations that you will encounter.

Attachment:- Cryptography.rar

Reference no: EM133001064

Questions Cloud

What is project discounted payback : What is this project's discounted payback?
Find the one-month holding-period return : The multiplier for a futures contract on the stock-market index is $50. The maturity of the contract is one year, the current level ofthe index is 2,000, and th
What is the amount of bond amortization for each six month : Towson uses the straight line method to amortize any bond premium or discount. What is the amount of bond amortization for each six month period?
Calculate the annual lease payment : Koss Leasing requires a 14 percent return on its investments. It is prepared to lease you a truck for two years, provided that it can achieve this return. The l
SIT281 Cryptography Assignment : SIT281 Cryptography Assignment Help and Solution, Deakin University - Assessment Writing Service - Determine the shared secret that each obtains
Rising interest rates leads to debt anxiety : Jasper and Anneka Rehnquist, a married couple living in Toronto, are sitting in your office seeking help with their financial situation. They have advised you t
What amount will arundel need to pay preferred shareholders : Paid no dividends in 2020. What amount will Arundel need to pay preferred shareholders in 2021 if they wish to pay a dividend to common shareholders?
What is the net present value of the project : General Motors has a weighted average cost of capital of 10%. GM is considering investing in a new plant that will save the company $30 million over each of the
Why auditor need to be diligent in ensuring : Why Auditor's need to be diligent in ensuring that different business segment's financial statements properly reconcile to the consolidated financial statements

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd