SIT281 Cryptography Assignment

Assignment Help Computer Engineering
Reference no: EM133001064

SIT281 Cryptography - Deakin University

GUILLERMO PINEDA-VILLAVICENCIO

INSTRUCTIONS
This is an individual assignment. The aim of the assignment is that the student applies concepts and methods studied in weeks 6-7 to solve problems on the Advanced Encryption Standard, discrete logarithms, ElGamal public-key system, and the Diffie-Hellman key exchange.

PROBLEMS

Problem (1) This question is about the Advanced Encryption Standard.

(a) In the SubBytes transformation, each of the bytes of an input matrix is changed to another byte by the Table 8.1 of the textbook (S-Box table). In the question, we compute two entries of this table. In this table, if you are given the byte abcdefgh, then you look for the entry in the abcd row and the efgh column. The rows and columns are numbered from 0 to 15. Compute the relevant entries of the S-Box table for the given bytes 10110101 and 00000000.
Note: You need to compute the relevant entries in the table. No marks will be given for directly quoting the values in the S-Box table.

(b) In the MixColumns Transformation, an input matrix is multiplied by a fixed matrix, and the resulting matrix is the output. Here the addition and mul- tiplication is done in GF (28). Compute the missing entries of the resulting matrix. Give your answer in hexadecimal base, as the other entries of the matrix.

656_figure.jpg

Recall that in these matrices 02 = 00000010 = x and 1A = 00011010 = x4 + x3 + x.

Problem (2) Alice and Bob has designed a public key cryptosystem based on the ElGamal. Bob has chosen the prime p = 73 and the primitive root α = 5. Bob's private key is an integer b = 60 such that β ≡ αb ≡ 65 (mod p). Bob publishes the triple (p, α, β).
(a) Alice chooses a secret number k = 30 to send the message 123456 to Bob. What pair or pairs does Bob receive?
(b) Do you think that Alice should have chosen k = 30? Give an answer and justify it.
(c) What should Bob do to decrypt the pair or pairs he received from Alice? During computation, make sure Bob does not compute any inverses.
(d) Verify the answer of Parts (a) and (c) in sagemath.

Problem (3) This exercise is about the Diffie-Hellman exchange protocol. Alice and Bob agrees to use the public prime p = 1009 and the public primitive root α = 11. Alice also chooses a secret random number x = 101. And Bob chooses a secret random number y = 41.
(a) Describe what information Alice and Bob send each other. Justify your an- swer.
(b) Determine the shared secret that each obtains.
(c) Suppose that Eve witnesses this entire exchange, the information that Alice sent to Bob, the information that Bob sent to Alice, and the public informa- tion of this exchange. Eve cannot compute discrete logarithms directly, but she is able to compute modular exponentiation with positive exponents only. Describe how she can obtain Alice's and Bob's shared secret; this involves solving the necessary equations that Eve should solve.

Problem (4) This problem computes discrete logarithms.
(a) Describe a Baby Step, Giant Step attack to find x in 5x ≡ 46 (mod 47).
(b) In this exercise you will independently study the Pohlig-Hellman algorithm (Section of 10.2.1 of the textbook). Apply the Pohlig-Hellman algorithm to find y in 5y ≡ 20 (mod 47).
(c) Without using a Baby Step, Giant Step attack or the Pohlig-Hellman algo- rithm, compute manually 5z ≡ 27 (mod 47).
Note: In this question, you may use sagemath to compute the in- termediate modular exponentiations that you will encounter.

Attachment:- Cryptography.rar

Reference no: EM133001064

Questions Cloud

What is project discounted payback : What is this project's discounted payback?
Find the one-month holding-period return : The multiplier for a futures contract on the stock-market index is $50. The maturity of the contract is one year, the current level ofthe index is 2,000, and th
What is the amount of bond amortization for each six month : Towson uses the straight line method to amortize any bond premium or discount. What is the amount of bond amortization for each six month period?
Calculate the annual lease payment : Koss Leasing requires a 14 percent return on its investments. It is prepared to lease you a truck for two years, provided that it can achieve this return. The l
SIT281 Cryptography Assignment : SIT281 Cryptography Assignment Help and Solution, Deakin University - Assessment Writing Service - Determine the shared secret that each obtains
Rising interest rates leads to debt anxiety : Jasper and Anneka Rehnquist, a married couple living in Toronto, are sitting in your office seeking help with their financial situation. They have advised you t
What amount will arundel need to pay preferred shareholders : Paid no dividends in 2020. What amount will Arundel need to pay preferred shareholders in 2021 if they wish to pay a dividend to common shareholders?
What is the net present value of the project : General Motors has a weighted average cost of capital of 10%. GM is considering investing in a new plant that will save the company $30 million over each of the
Why auditor need to be diligent in ensuring : Why Auditor's need to be diligent in ensuring that different business segment's financial statements properly reconcile to the consolidated financial statements

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why database re-engineering and redesign is required

define what should be done when adding tables and relationships for normalization.

  Appraise the individual and organizational consequences of

compare and contrast the mis in place in two distinctly different organizations.nbspcompare each organizations usenbsp

  What is a database for

What is a database for? Databases in Access are made up of four fundamental elements, mention and explain each element. Your work must have a cover.

  Write ada program for a computer to be used as cash register

Develop a top-down design and write an Ada program for a computer to be used as a cash register at Alan's Bake Shop.

  Discuss usermod command is used to change a linux user

Discuss a specific parameter you would used with the usermod and what you need to consider either

  Write a program that imitates a lottery

Write a program that imitates a lottery. The program will use two one-dimensional arrays to store the winning numbers and the user's choices. A function will be use to decide whether the user has won or not.

  Discuss the threats and vulnerabilities to access control

Discuss the the threats and vulnerabilities to Access Control and what business must do to be protected. All paper are written in APA formatting.

  Define the term interface

List the four main components of a programmable logic controller.

  Research an anti-virus software package for a small business

You have been asked to recommend an Anti-Virus software package for a small business. The business is concerned about viruses and malware, because it has been.

  Create a list that contains the months of the year

Create a list that contains the months of the year. Create a loop to print the month number and name (do not hard code the month number).

  Design visual basic 2010 program to analyze a mortgage

Write down a Visual Basic 2010 program to analyze a mortgage. The user should enter the amount of the loan, the annual rate of interest, and the duration of the loan in months.

  How a semaphore could be used to implement such a server

Question from OS Sometimes servers wish to limit the number of active connections they have open at any one time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd