前引
* 目前只有97、98以及107年的紀錄,因此較難猜題
* 110 下學期因為遠距課程,期末改以報告形式進行,本文作業暫停
題目
Ciphertext-only attack
- 攻擊者僅有密文。
- 攻擊者有encryption/decryption program
Known-plaintext attack
- 攻擊者有一組以上密文與明文。
- 攻擊者有encryption/decryption program
Chosen-Plaintext Attack
- 攻擊者可將明文轉為密文。
- 攻擊者有encryption/decryption program
Chosen-Ciphertext Attack
- 攻擊者可將密文轉為明文。
- 攻擊者有encryption/decryption program
Kerckhoffs原理
- 『對於一密碼系統的安全性,應假設敵人是知道所使用的方法。』
- 攻擊者有encryption/decryption program
2. S-boxes
- 98, 107
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
Which type of (Ciphertext-only attack, Known-plaintext attack, Chosen-Plaintext Attack or Chosen-Ciphertext Attack) should linear attack be classified as?
Which type of (Ciphertext-only attack, Known-plaintext attack, Chosen-Plaintext Attack or Chosen-Ciphertext Attack) should differential be classified as?
probability holds
- if + means XOR
- We are checking for equals to 0 to hold. If we split x and y into two groups to process , remember that the results of the two groups has to be equal for XOR to result in 0.
- Bias is the probility -1/2
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
Find the probability that holds
|
|
|
0 |
1 |
0 |
0 |
0 |
1 |
0 |
1 |
0 |
0 |
1 |
0 |
1 |
1 |
1 |
1 |
0 |
0 |
1 |
0 |
0 |
1 |
0 |
0 |
0 |
0 |
1 |
0 |
1 |
0 |
0 |
1 |
0 |
0 |
0 |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
0 |
0 |
1 |
0 |
0 |
Find the probability that holds
|
|
|
0 |
0 |
1 |
1 |
1 |
1 |
0 |
1 |
0 |
1 |
1 |
1 |
0 |
0 |
1 |
1 |
1 |
1 |
0 |
0 |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
0 |
1 |
0 |
1 |
1 |
1 |
0 |
0 |
1 |
1 |
0 |
0 |
0 |
0 |
1 |
1 |
0 |
0 |
0 |
0 |
1 |
condition probability
Find the conditional probability that and
Find the conditional probability that and
3. Questions for AES
List the advantages of AES over DES
Write out AES-128 (10-round) encryption algorithm. The SubByte, ShiftRow, MixColumn, and AddRoundkey procedures can be called as a command.
Encryption
Decryption
4. Consider an RSA crypto-system whose public key is …
Find prime numbers p and q such that
107
98
Find the private key(d,n)
98
107
Decrypt the ciphertext
98.
107.
- 1000^517 mod 4493 = ?
- 算得出來?
Is it possible to find a different value of in the range of that also works in decryption. Explain why it is impossible, or find all possible values of
RSA Key gen
- find prime numbers and .
- Calculate
- Calculate
- Select e, s.t.
- Calculate
- Public key:
- Private key:
5. Answer the following questions about RSA cryptosystem
What is common modulus attack
* same n

What is Small-e attack

What is cycling attack

How to avoid cycling attack
- choose better p,q
- p,q are large prime and
6. Describe algorithms(flow charts) to
Create a digital envelope

Open a digital envelope

7. Use flow charts to explain the RSA signature with hash function
Alice wants to sign a document M

- Hash plaintext and encrypt with Alice's private key
Bob wants to verify a signed document (M,s) from Alice

- decrypt signature with Alices's public key
- Generate hash value from plaintext and check if it matches the signature
教授版
8. Certificates of public key
Why certificates are necessary
- proves the authenticity of a device, server, or user
* things mentioned by x.509 Authentication framework
* includinge
* 使用者名稱 A
* 該使用者的公鑰 KUA
* 由 CA 對(A, KUA)所簽署的簽章*
* CA: certificate authority
Let a Certificate issued from A for B be denoted as A[B]
107

98

9. What is a "Computer Virus"? Describe the life cycle of a computer virus.
* 107
* Currently no PPT for this question
* 107
* Currently no PPT for this question
11. Common Modulus attack
- 98, 98


12. Consider a Rabin cryptosystem where the encryption function is . Find all possible plaintexts that encrypt to the ciphertext 23
Decrypt method
Answer
13. In a Diffie-Hellman key agreement between two persons A and B, (g,p) = (5,97). User A randomly choose x=4, and user B randomly selects y=9.
Which number should be sent from A to B
Which number should be sent from B to A
What is the agreed key
14. Please draw a diagram to explain the Dual Signature scheme used in SET(Secure Electronic Transaction).
- 97

- Currently no PPT for this question
- Probably watermarking