Which type of (Ciphertext-only attack, Known-plaintext attack, Chosen-Plaintext Attack or Chosen-Ciphertext Attack) should linear attack be classified as?
Known-plaintext attack
Which type of (Ciphertext-only attack, Known-plaintext attack, Chosen-Plaintext Attack or Chosen-Ciphertext Attack) should differential be classified as?
chosen-plaintext attack
probability holds
if + means XOR
We are checking for equals to 0 to hold. If we split x and y into two groups to process , remember that the results of the two groups has to be equal for XOR to result in 0.
4. Consider an RSA crypto-system whose public key is …
107
98
Find prime numbers p and q such that
107
n = 79 * 73
98
n = 13 * 17
Find the private key(d,n)
98
Ans: (5,221)
107
Ans: (517,4493)
Decrypt the ciphertext
98.
88^5 mod 221 = 219
107.
1000^517 mod 4493 = ?
算得出來?
Is it possible to find a different value of in the range of that also works in decryption. Explain why it is impossible, or find all possible values of
RSA Key gen
find prime numbers and .
Calculate
Calculate
Select e, s.t.
Calculate
Public key:
Private key:
5. Answer the following questions about RSA cryptosystem
107
What is common modulus attack
* same n
Choose different n's
What is Small-e attack
e too small
choose large e
What is cycling attack
How to avoid cycling attack
choose better p,q
p,q are large prime and
is prime
is prime
6. Describe algorithms(flow charts) to
107
Create a digital envelope
Open a digital envelope
7. Use flow charts to explain the RSA signature with hash function
97,98,107
Alice wants to sign a document M
Hash plaintext and encrypt with Alice's private key
Bob wants to verify a signed document (M,s) from Alice
decrypt signature with Alices's public key
Generate hash value from plaintext and check if it matches the signature
教授版
8. Certificates of public key
97,98, 107
Why certificates are necessary
proves the authenticity of a device, server, or user
Which information items should be contained in a certificate?
* things mentioned by x.509 Authentication framework * includinge * 使用者名稱 A * 該使用者的公鑰 KUA * 由 CA 對(A, KUA)所簽署的簽章* * CA: certificate authority
Let a Certificate issued from A for B be denoted as A[B]
需要確認答案是否正確
107
A,B,F
98
ans: A,E,D
9. What is a "Computer Virus"? Describe the life cycle of a computer virus.
* 107 * Currently no PPT for this question
10. What are the differences between "Information Hiding" and "Encryption"? What are the differences of "Steganography" and "Watermarking"
* 107 * Currently no PPT for this question
11. Common Modulus attack
98, 98
12. Consider a Rabin cryptosystem where the encryption function is . Find all possible plaintexts that encrypt to the ciphertext 23
97,98
Decrypt method
Answer
13. In a Diffie-Hellman key agreement between two persons A and B, (g,p) = (5,97). User A randomly choose x=4, and user B randomly selects y=9.
97, 98
Which number should be sent from A to B
Which number should be sent from B to A
What is the agreed key
14. Please draw a diagram to explain the Dual Signature scheme used in SET(Secure Electronic Transaction).
97
15. Is it possible to apply the technology such as encryption/decryption and digital signature in information security to multimedia. say images or videos? If it is possible, describe some applications; otherwise, explain why it is impossible